Warning: Permanently added '44.201.212.95' (ED25519) to the list of known hosts. You can reproduce this build on your computer by running: sudo dnf install copr-rpmbuild /usr/bin/copr-rpmbuild --verbose --drop-resultdir --task-url https://copr.fedorainfracloud.org/backend/get-build-task/9503167-fedora-43-x86_64 --chroot fedora-43-x86_64 Version: 1.4 PID: 36089 Logging PID: 36091 Task: {'allow_user_ssh': False, 'appstream': False, 'background': True, 'build_id': 9503167, 'buildroot_pkgs': [], 'chroot': 'fedora-43-x86_64', 'enable_net': False, 'fedora_review': False, 'git_hash': 'f8759fa20f517ca97574712c40dceab6e5b7e6d7', 'git_repo': 'https://copr-dist-git.fedorainfracloud.org/git/@python/python-in-pulp/python-django-allauth', 'isolation': 'default', 'memory_reqs': 2048, 'package_name': 'python-django-allauth', 'package_version': '65.3.0-5', 'project_dirname': 'python-in-pulp', 'project_name': 'python-in-pulp', 'project_owner': '@python', 'repo_priority': None, 'repos': [{'baseurl': 'https://console.redhat.com/api/pulp-content/public-copr/@python/python-in-pulp/fedora-43-x86_64/', 'id': 'copr_base', 'name': 'Copr repository', 'priority': None}], 'sandbox': '@python/python-in-pulp--frostyx', 'source_json': {}, 'source_type': None, 'ssh_public_keys': None, 'storage': 1, 'submitter': 'frostyx', 'tags': [], 'task_id': '9503167-fedora-43-x86_64', 'timeout': 18000, 'uses_devel_repo': False, 'with_opts': [], 'without_opts': []} Running: git clone https://copr-dist-git.fedorainfracloud.org/git/@python/python-in-pulp/python-django-allauth /var/lib/copr-rpmbuild/workspace/workdir-g4bfk2sc/python-django-allauth --depth 500 --no-single-branch --recursive cmd: ['git', 'clone', 'https://copr-dist-git.fedorainfracloud.org/git/@python/python-in-pulp/python-django-allauth', '/var/lib/copr-rpmbuild/workspace/workdir-g4bfk2sc/python-django-allauth', '--depth', '500', '--no-single-branch', '--recursive'] cwd: . rc: 0 stdout: stderr: Cloning into '/var/lib/copr-rpmbuild/workspace/workdir-g4bfk2sc/python-django-allauth'... Running: git checkout f8759fa20f517ca97574712c40dceab6e5b7e6d7 -- cmd: ['git', 'checkout', 'f8759fa20f517ca97574712c40dceab6e5b7e6d7', '--'] cwd: /var/lib/copr-rpmbuild/workspace/workdir-g4bfk2sc/python-django-allauth rc: 0 stdout: stderr: Note: switching to 'f8759fa20f517ca97574712c40dceab6e5b7e6d7'. You are in 'detached HEAD' state. You can look around, make experimental changes and commit them, and you can discard any commits you make in this state without impacting any branches by switching back to a branch. If you want to create a new branch to retain commits you create, you may do so (now or later) by using -c with the switch command. Example: git switch -c Or undo this operation with: git switch - Turn off this advice by setting config variable advice.detachedHead to false HEAD is now at f8759fa automatic import of python-django-allauth Running: dist-git-client sources cmd: ['dist-git-client', 'sources'] cwd: /var/lib/copr-rpmbuild/workspace/workdir-g4bfk2sc/python-django-allauth rc: 0 stdout: stderr: INFO: Reading stdout from command: git rev-parse --abbrev-ref HEAD INFO: Reading stdout from command: git rev-parse HEAD INFO: Reading sources specification file: sources INFO: Downloading django-allauth-65.3.0.tar.gz INFO: Reading stdout from command: curl --help all INFO: Calling: curl -H Pragma: -o django-allauth-65.3.0.tar.gz --location --connect-timeout 60 --retry 3 --retry-delay 10 --remote-time --show-error --fail --retry-all-errors https://copr-dist-git.fedorainfracloud.org/repo/pkgs/@python/python-in-pulp/python-django-allauth/django-allauth-65.3.0.tar.gz/md5/1483786351ea20a64869253d363371e8/django-allauth-65.3.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 1192k 100 1192k 0 0 18.6M 0 --:--:-- --:--:-- --:--:-- 18.7M INFO: Reading stdout from command: md5sum django-allauth-65.3.0.tar.gz tail: /var/lib/copr-rpmbuild/main.log: file truncated Running (timeout=18000): unbuffer mock --spec /var/lib/copr-rpmbuild/workspace/workdir-g4bfk2sc/python-django-allauth/python-django-allauth.spec --sources /var/lib/copr-rpmbuild/workspace/workdir-g4bfk2sc/python-django-allauth --resultdir /var/lib/copr-rpmbuild/results --uniqueext 1756503654.411359 -r /var/lib/copr-rpmbuild/results/configs/child.cfg INFO: mock.py version 6.3 starting (python version = 3.13.5, NVR = mock-6.3-1.fc42), args: /usr/libexec/mock/mock --spec /var/lib/copr-rpmbuild/workspace/workdir-g4bfk2sc/python-django-allauth/python-django-allauth.spec --sources /var/lib/copr-rpmbuild/workspace/workdir-g4bfk2sc/python-django-allauth --resultdir /var/lib/copr-rpmbuild/results --uniqueext 1756503654.411359 -r /var/lib/copr-rpmbuild/results/configs/child.cfg Start(bootstrap): init plugins INFO: tmpfs initialized INFO: selinux enabled INFO: chroot_scan: initialized INFO: compress_logs: initialized Finish(bootstrap): init plugins Start: init plugins INFO: tmpfs initialized INFO: selinux enabled INFO: chroot_scan: initialized INFO: compress_logs: initialized Finish: init plugins INFO: Signal handler active Start: run INFO: Start(/var/lib/copr-rpmbuild/workspace/workdir-g4bfk2sc/python-django-allauth/python-django-allauth.spec) Config(fedora-43-x86_64) Start: clean chroot Finish: clean chroot Mock Version: 6.3 INFO: Mock Version: 6.3 Start(bootstrap): chroot init INFO: mounting tmpfs at /var/lib/mock/fedora-43-x86_64-bootstrap-1756503654.411359/root. INFO: calling preinit hooks INFO: enabled root cache INFO: enabled package manager cache Start(bootstrap): cleaning package manager metadata Finish(bootstrap): cleaning package manager metadata INFO: Guessed host environment type: unknown INFO: Using container image: registry.fedoraproject.org/fedora:43 INFO: Pulling image: registry.fedoraproject.org/fedora:43 INFO: Tagging container image as mock-bootstrap-0f2c9a11-bbe7-4250-8748-280bde1d2795 INFO: Checking that 382e5aabd9bd7331e949b34780ba0537cbb4fa158b9bc862b686bf5242491e14 image matches host's architecture INFO: Copy content of container 382e5aabd9bd7331e949b34780ba0537cbb4fa158b9bc862b686bf5242491e14 to /var/lib/mock/fedora-43-x86_64-bootstrap-1756503654.411359/root INFO: mounting 382e5aabd9bd7331e949b34780ba0537cbb4fa158b9bc862b686bf5242491e14 with podman image mount INFO: image 382e5aabd9bd7331e949b34780ba0537cbb4fa158b9bc862b686bf5242491e14 as /var/lib/containers/storage/overlay/bad52b50ba49d792ba4b7ca519e55a6cb55d2e9af90ec0b989c74c638ba30c18/merged INFO: umounting image 382e5aabd9bd7331e949b34780ba0537cbb4fa158b9bc862b686bf5242491e14 (/var/lib/containers/storage/overlay/bad52b50ba49d792ba4b7ca519e55a6cb55d2e9af90ec0b989c74c638ba30c18/merged) with podman image umount INFO: Removing image mock-bootstrap-0f2c9a11-bbe7-4250-8748-280bde1d2795 INFO: Package manager dnf5 detected and used (fallback) INFO: Not updating bootstrap chroot, bootstrap_image_ready=True Start(bootstrap): creating root cache Finish(bootstrap): creating root cache Finish(bootstrap): chroot init Start: chroot init INFO: mounting tmpfs at /var/lib/mock/fedora-43-x86_64-1756503654.411359/root. INFO: calling preinit hooks INFO: enabled root cache INFO: enabled package manager cache Start: cleaning package manager metadata Finish: cleaning package manager metadata INFO: enabled HW Info plugin INFO: Package manager dnf5 detected and used (direct choice) INFO: Buildroot is handled by package management downloaded with a bootstrap image: rpm-5.99.91-5.fc43.x86_64 rpm-sequoia-1.9.0-2.fc43.x86_64 dnf5-5.2.16.0-3.fc43.x86_64 dnf5-plugins-5.2.16.0-3.fc43.x86_64 Start: installing minimal buildroot with dnf5 Updating and loading repositories: Copr repository 100% | 21.7 KiB/s | 1.5 KiB | 00m00s fedora 100% | 135.3 KiB/s | 25.6 KiB | 00m00s updates 100% | 243.2 KiB/s | 31.1 KiB | 00m00s Repositories loaded. Package Arch Version Repository Size Installing group/module packages: bash x86_64 5.3.0-2.fc43 fedora 8.4 MiB bzip2 x86_64 1.0.8-21.fc43 fedora 95.3 KiB coreutils x86_64 9.7-5.fc43 fedora 5.4 MiB cpio x86_64 2.15-6.fc43 fedora 1.1 MiB diffutils x86_64 3.12-3.fc43 fedora 1.6 MiB fedora-release-common noarch 43-0.22 fedora 20.4 KiB findutils x86_64 1:4.10.0-6.fc43 fedora 1.8 MiB gawk x86_64 5.3.2-2.fc43 fedora 1.8 MiB glibc-minimal-langpack x86_64 2.42-4.fc43 fedora 0.0 B grep x86_64 3.12-2.fc43 fedora 1.0 MiB gzip x86_64 1.13-4.fc43 fedora 388.8 KiB info x86_64 7.2-6.fc43 fedora 353.9 KiB patch x86_64 2.8-2.fc43 fedora 222.8 KiB redhat-rpm-config noarch 343-11.fc43 fedora 182.9 KiB rpm-build x86_64 5.99.92-1.fc43 copr_base 285.5 KiB sed x86_64 4.9-5.fc43 fedora 857.3 KiB shadow-utils x86_64 2:4.18.0-3.fc43 fedora 3.9 MiB tar x86_64 2:1.35-6.fc43 fedora 2.9 MiB unzip x86_64 6.0-67.fc43 fedora 386.3 KiB util-linux x86_64 2.41.1-16.fc43 fedora 3.5 MiB which x86_64 2.23-3.fc43 fedora 83.5 KiB xz x86_64 1:5.8.1-2.fc43 fedora 1.3 MiB Installing dependencies: add-determinism x86_64 0.6.0-2.fc43 fedora 2.4 MiB alternatives x86_64 1.33-2.fc43 fedora 62.2 KiB ansible-srpm-macros noarch 1-18.1.fc43 fedora 35.7 KiB audit-libs x86_64 4.1.1-2.fc43 fedora 378.8 KiB binutils x86_64 2.45-1.fc43 fedora 26.5 MiB build-reproducibility-srpm-macros noarch 0.6.0-2.fc43 fedora 735.0 B bzip2-libs x86_64 1.0.8-21.fc43 fedora 80.6 KiB ca-certificates noarch 2025.2.80_v9.0.304-1.0.fc43 fedora 2.7 MiB coreutils-common x86_64 9.7-5.fc43 fedora 11.3 MiB crypto-policies noarch 20250714-4.gitcd6043a.fc43 fedora 146.9 KiB curl x86_64 8.15.0-2.fc43 fedora 473.6 KiB cyrus-sasl-lib x86_64 2.1.28-33.fc43 fedora 2.3 MiB debugedit x86_64 5.2-2.fc43 fedora 197.8 KiB dwz x86_64 0.16-2.fc43 fedora 287.1 KiB ed x86_64 1.22.2-1.fc43 fedora 148.1 KiB efi-srpm-macros noarch 6-4.fc43 fedora 40.1 KiB elfutils x86_64 0.193-3.fc43 fedora 2.9 MiB elfutils-debuginfod-client x86_64 0.193-3.fc43 fedora 83.9 KiB elfutils-default-yama-scope noarch 0.193-3.fc43 fedora 1.8 KiB elfutils-libelf x86_64 0.193-3.fc43 fedora 1.2 MiB elfutils-libs x86_64 0.193-3.fc43 fedora 683.4 KiB fedora-gpg-keys noarch 43-0.4 fedora 131.2 KiB fedora-release noarch 43-0.22 fedora 0.0 B fedora-release-identity-basic noarch 43-0.22 fedora 658.0 B fedora-repos noarch 43-0.4 fedora 4.9 KiB file x86_64 5.46-7.fc43 fedora 100.2 KiB file-libs x86_64 5.46-7.fc43 fedora 11.9 MiB filesystem x86_64 3.18-50.fc43 fedora 112.0 B filesystem-srpm-macros noarch 3.18-50.fc43 fedora 38.2 KiB fonts-srpm-macros noarch 1:2.0.5-23.fc43 fedora 55.8 KiB forge-srpm-macros noarch 0.4.0-3.fc43 fedora 38.9 KiB fpc-srpm-macros noarch 1.3-15.fc43 fedora 144.0 B gap-srpm-macros noarch 1-1.fc43 fedora 2.0 KiB gdb-minimal x86_64 16.3-5.fc43 fedora 13.3 MiB gdbm-libs x86_64 1:1.23-10.fc43 fedora 129.9 KiB ghc-srpm-macros noarch 1.9.2-3.fc43 fedora 779.0 B glibc x86_64 2.42-4.fc43 fedora 6.7 MiB glibc-common x86_64 2.42-4.fc43 fedora 1.0 MiB glibc-gconv-extra x86_64 2.42-4.fc43 fedora 7.2 MiB gmp x86_64 1:6.3.0-4.fc43 fedora 811.2 KiB gnat-srpm-macros noarch 6-8.fc43 fedora 1.0 KiB gnupg2 x86_64 2.4.8-4.fc43 fedora 6.5 MiB gnupg2-dirmngr x86_64 2.4.8-4.fc43 fedora 618.4 KiB gnupg2-gpg-agent x86_64 2.4.8-4.fc43 fedora 671.4 KiB gnupg2-gpgconf x86_64 2.4.8-4.fc43 fedora 250.0 KiB gnupg2-keyboxd x86_64 2.4.8-4.fc43 fedora 201.4 KiB gnupg2-verify x86_64 2.4.8-4.fc43 fedora 348.5 KiB gnutls x86_64 3.8.10-3.fc43 fedora 3.8 MiB go-srpm-macros noarch 3.7.0-4.fc43 fedora 61.6 KiB gpgverify noarch 2.2-3.fc43 fedora 8.7 KiB ima-evm-utils-libs x86_64 1.6.2-6.fc43 fedora 60.7 KiB jansson x86_64 2.14-3.fc43 fedora 89.1 KiB java-srpm-macros noarch 1-7.fc43 fedora 870.0 B json-c x86_64 0.18-7.fc43 fedora 82.7 KiB kernel-srpm-macros noarch 1.0-27.fc43 fedora 1.9 KiB keyutils-libs x86_64 1.6.3-6.fc43 fedora 54.3 KiB krb5-libs x86_64 1.21.3-7.fc43 fedora 2.3 MiB libacl x86_64 2.3.2-4.fc43 fedora 35.9 KiB libarchive x86_64 3.8.1-3.fc43 fedora 951.1 KiB libassuan x86_64 2.5.7-4.fc43 fedora 163.8 KiB libattr x86_64 2.5.2-6.fc43 fedora 24.4 KiB libblkid x86_64 2.41.1-16.fc43 fedora 262.4 KiB libbrotli x86_64 1.1.0-9.fc43 fedora 833.3 KiB libcap x86_64 2.76-3.fc43 fedora 209.1 KiB libcap-ng x86_64 0.8.5-7.fc43 fedora 68.9 KiB libcom_err x86_64 1.47.3-2.fc43 fedora 63.1 KiB libcurl x86_64 8.15.0-2.fc43 fedora 903.2 KiB libeconf x86_64 0.7.9-2.fc43 fedora 64.9 KiB libevent x86_64 2.1.12-16.fc43 fedora 883.1 KiB libfdisk x86_64 2.41.1-16.fc43 fedora 380.4 KiB libffi x86_64 3.5.1-2.fc43 fedora 83.6 KiB libfsverity x86_64 1.6-3.fc43 fedora 28.5 KiB libgcc x86_64 15.2.1-1.fc43.1 fedora 266.6 KiB libgcrypt x86_64 1.11.1-2.fc43 fedora 1.6 MiB libgomp x86_64 15.2.1-1.fc43.1 fedora 541.1 KiB libgpg-error x86_64 1.55-2.fc43 fedora 915.3 KiB libidn2 x86_64 2.3.8-2.fc43 fedora 552.5 KiB libksba x86_64 1.6.7-4.fc43 fedora 398.5 KiB liblastlog2 x86_64 2.41.1-16.fc43 fedora 33.9 KiB libmount x86_64 2.41.1-16.fc43 fedora 372.7 KiB libnghttp2 x86_64 1.66.0-2.fc43 fedora 162.2 KiB libpkgconf x86_64 2.3.0-3.fc43 fedora 78.1 KiB libpsl x86_64 0.21.5-6.fc43 fedora 76.4 KiB libselinux x86_64 3.9-4.fc43 fedora 193.1 KiB libsemanage x86_64 3.9-3.fc43 fedora 308.5 KiB libsepol x86_64 3.9-2.fc43 fedora 822.0 KiB libsmartcols x86_64 2.41.1-16.fc43 fedora 180.5 KiB libssh x86_64 0.11.2-2.fc43 fedora 566.7 KiB libssh-config noarch 0.11.2-2.fc43 fedora 277.0 B libstdc++ x86_64 15.2.1-1.fc43.1 fedora 2.8 MiB libtasn1 x86_64 4.20.0-2.fc43 fedora 176.3 KiB libtool-ltdl x86_64 2.5.4-7.fc43 fedora 70.1 KiB libunistring x86_64 1.1-10.fc43 fedora 1.7 MiB libusb1 x86_64 1.0.29-3.fc43 fedora 171.3 KiB libuuid x86_64 2.41.1-16.fc43 fedora 37.4 KiB libverto x86_64 0.3.2-11.fc43 fedora 25.4 KiB libxcrypt x86_64 4.4.38-8.fc43 fedora 284.5 KiB libxml2 x86_64 2.12.10-4.fc43 fedora 1.7 MiB libzstd x86_64 1.5.7-2.fc43 fedora 799.9 KiB lua-libs x86_64 5.4.8-2.fc43 fedora 280.8 KiB lua-srpm-macros noarch 1-16.fc43 fedora 1.3 KiB lz4-libs x86_64 1.10.0-3.fc43 fedora 161.4 KiB mpfr x86_64 4.2.2-2.fc43 fedora 832.8 KiB ncurses-base noarch 6.5-7.20250614.fc43 fedora 328.1 KiB ncurses-libs x86_64 6.5-7.20250614.fc43 fedora 946.3 KiB nettle x86_64 3.10.1-2.fc43 fedora 790.6 KiB npth x86_64 1.8-3.fc43 fedora 49.6 KiB ocaml-srpm-macros noarch 11-2.fc43 fedora 1.9 KiB openblas-srpm-macros noarch 2-20.fc43 fedora 112.0 B openldap x86_64 2.6.10-3.fc43 fedora 655.8 KiB openssl-libs x86_64 1:3.5.1-2.fc43 fedora 8.9 MiB p11-kit x86_64 0.25.5-9.fc43 fedora 2.2 MiB p11-kit-trust x86_64 0.25.5-9.fc43 fedora 395.5 KiB package-notes-srpm-macros noarch 0.5-14.fc43 fedora 1.6 KiB pam-libs x86_64 1.7.1-3.fc43 fedora 126.8 KiB pcre2 x86_64 10.45-1.fc43.1 fedora 697.7 KiB pcre2-syntax noarch 10.45-1.fc43.1 fedora 273.9 KiB perl-srpm-macros noarch 1-60.fc43 fedora 861.0 B pkgconf x86_64 2.3.0-3.fc43 fedora 88.5 KiB pkgconf-m4 noarch 2.3.0-3.fc43 fedora 14.4 KiB pkgconf-pkg-config x86_64 2.3.0-3.fc43 fedora 989.0 B popt x86_64 1.19-9.fc43 fedora 132.8 KiB publicsuffix-list-dafsa noarch 20250616-2.fc43 fedora 69.1 KiB pyproject-srpm-macros noarch 1.18.3-2.fc43 fedora 1.9 KiB python-srpm-macros noarch 3.14-5.fc43 fedora 51.5 KiB qt5-srpm-macros noarch 5.15.17-2.fc43 fedora 500.0 B qt6-srpm-macros noarch 6.9.1-2.fc43 fedora 464.0 B readline x86_64 8.3-2.fc43 fedora 511.7 KiB rpm x86_64 5.99.92-1.fc43 copr_base 3.0 MiB rpm-build-libs x86_64 5.99.92-1.fc43 copr_base 272.4 KiB rpm-libs x86_64 5.99.92-1.fc43 copr_base 933.7 KiB rpm-sequoia x86_64 1.9.0-2.fc43 fedora 2.5 MiB rpm-sign-libs x86_64 5.99.92-1.fc43 copr_base 39.8 KiB rust-srpm-macros noarch 26.4-1.fc43 fedora 4.8 KiB setup noarch 2.15.0-26.fc43 fedora 725.0 KiB sqlite-libs x86_64 3.50.2-2.fc43 fedora 1.5 MiB systemd-libs x86_64 257.7-1.fc43 fedora 2.2 MiB systemd-standalone-sysusers x86_64 257.7-1.fc43 fedora 277.3 KiB tpm2-tss x86_64 4.1.3-8.fc43 fedora 1.6 MiB tree-sitter-srpm-macros noarch 0.4.2-1.fc43 fedora 8.3 KiB util-linux-core x86_64 2.41.1-16.fc43 fedora 1.5 MiB xxhash-libs x86_64 0.8.3-3.fc43 fedora 90.2 KiB xz-libs x86_64 1:5.8.1-2.fc43 fedora 217.8 KiB zig-srpm-macros noarch 1-5.fc43 fedora 1.1 KiB zip x86_64 3.0-44.fc43 fedora 694.5 KiB zlib-ng-compat x86_64 2.2.5-1.fc43 fedora 137.6 KiB zstd x86_64 1.5.7-2.fc43 fedora 1.7 MiB Installing groups: Buildsystem building group Transaction Summary: Installing: 169 packages Total size of inbound packages is 59 MiB. Need to download 0 B. After this operation, 198 MiB extra will be used (install 198 MiB, remove 0 B). [ 1/169] tar-2:1.35-6.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 2/169] bzip2-0:1.0.8-21.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 3/169] redhat-rpm-config-0:343-11.fc 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 4/169] unzip-0:6.0-67.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 5/169] cpio-0:2.15-6.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 6/169] which-0:2.23-3.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 7/169] bash-0:5.3.0-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 8/169] coreutils-0:9.7-5.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 9/169] grep-0:3.12-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 10/169] patch-0:2.8-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 11/169] sed-0:4.9-5.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 12/169] shadow-utils-2:4.18.0-3.fc43. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 13/169] diffutils-0:3.12-3.fc43.x86_6 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 14/169] fedora-release-common-0:43-0. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 15/169] findutils-1:4.10.0-6.fc43.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 16/169] glibc-minimal-langpack-0:2.42 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 17/169] gzip-0:1.13-4.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 18/169] info-0:7.2-6.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 19/169] xz-1:5.8.1-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 20/169] rpm-build-0:5.99.92-1.fc43.x8 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 21/169] util-linux-0:2.41.1-16.fc43.x 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 22/169] gawk-0:5.3.2-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 23/169] glibc-0:2.42-4.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 24/169] libacl-0:2.3.2-4.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 25/169] libselinux-0:3.9-4.fc43.x86_6 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 26/169] bzip2-libs-0:1.0.8-21.fc43.x8 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 27/169] ansible-srpm-macros-0:1-18.1. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 28/169] build-reproducibility-srpm-ma 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 29/169] dwz-0:0.16-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 30/169] efi-srpm-macros-0:6-4.fc43.no 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 31/169] file-0:5.46-7.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 32/169] filesystem-srpm-macros-0:3.18 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 33/169] fonts-srpm-macros-1:2.0.5-23. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 34/169] forge-srpm-macros-0:0.4.0-3.f 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 35/169] fpc-srpm-macros-0:1.3-15.fc43 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 36/169] gap-srpm-macros-0:1-1.fc43.no 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 37/169] ghc-srpm-macros-0:1.9.2-3.fc4 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 38/169] gnat-srpm-macros-0:6-8.fc43.n 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 39/169] go-srpm-macros-0:3.7.0-4.fc43 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 40/169] java-srpm-macros-0:1-7.fc43.n 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 41/169] kernel-srpm-macros-0:1.0-27.f 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 42/169] lua-srpm-macros-0:1-16.fc43.n 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 43/169] ocaml-srpm-macros-0:11-2.fc43 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 44/169] openblas-srpm-macros-0:2-20.f 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 45/169] package-notes-srpm-macros-0:0 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 46/169] perl-srpm-macros-0:1-60.fc43. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 47/169] pyproject-srpm-macros-0:1.18. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 48/169] python-srpm-macros-0:3.14-5.f 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 49/169] qt5-srpm-macros-0:5.15.17-2.f 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 50/169] qt6-srpm-macros-0:6.9.1-2.fc4 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 51/169] rust-srpm-macros-0:26.4-1.fc4 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 52/169] tree-sitter-srpm-macros-0:0.4 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 53/169] zig-srpm-macros-0:1-5.fc43.no 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 54/169] zip-0:3.0-44.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 55/169] filesystem-0:3.18-50.fc43.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 56/169] ncurses-libs-0:6.5-7.20250614 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 57/169] coreutils-common-0:9.7-5.fc43 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 58/169] gmp-1:6.3.0-4.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 59/169] libattr-0:2.5.2-6.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 60/169] libcap-0:2.76-3.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 61/169] openssl-libs-1:3.5.1-2.fc43.x 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 62/169] systemd-libs-0:257.7-1.fc43.x 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 63/169] pcre2-0:10.45-1.fc43.1.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 64/169] ed-0:1.22.2-1.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 65/169] audit-libs-0:4.1.1-2.fc43.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 66/169] libeconf-0:0.7.9-2.fc43.x86_6 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 67/169] libsemanage-0:3.9-3.fc43.x86_ 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 68/169] libxcrypt-0:4.4.38-8.fc43.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 69/169] pam-libs-0:1.7.1-3.fc43.x86_6 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 70/169] setup-0:2.15.0-26.fc43.noarch 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 71/169] fedora-repos-0:43-0.4.noarch 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 72/169] glibc-common-0:2.42-4.fc43.x8 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 73/169] xz-libs-1:5.8.1-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 74/169] rpm-0:5.99.92-1.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 75/169] debugedit-0:5.2-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 76/169] elfutils-0:0.193-3.fc43.x86_6 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 77/169] elfutils-libelf-0:0.193-3.fc4 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 78/169] libarchive-0:3.8.1-3.fc43.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 79/169] libgcc-0:15.2.1-1.fc43.1.x86_ 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 80/169] libstdc++-0:15.2.1-1.fc43.1.x 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 81/169] popt-0:1.19-9.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 82/169] readline-0:8.3-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 83/169] zstd-0:1.5.7-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 84/169] libblkid-0:2.41.1-16.fc43.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 85/169] libcap-ng-0:0.8.5-7.fc43.x86_ 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 86/169] libfdisk-0:2.41.1-16.fc43.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 87/169] liblastlog2-0:2.41.1-16.fc43. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 88/169] libmount-0:2.41.1-16.fc43.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 89/169] libsmartcols-0:2.41.1-16.fc43 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 90/169] libuuid-0:2.41.1-16.fc43.x86_ 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 91/169] util-linux-core-0:2.41.1-16.f 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 92/169] zlib-ng-compat-0:2.2.5-1.fc43 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 93/169] mpfr-0:4.2.2-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 94/169] glibc-gconv-extra-0:2.42-4.fc 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 95/169] libsepol-0:3.9-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 96/169] add-determinism-0:0.6.0-2.fc4 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 97/169] file-libs-0:5.46-7.fc43.x86_6 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 98/169] ncurses-base-0:6.5-7.20250614 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 99/169] ca-certificates-0:2025.2.80_v 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [100/169] crypto-policies-0:20250714-4. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [101/169] pcre2-syntax-0:10.45-1.fc43.1 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [102/169] fedora-gpg-keys-0:43-0.4.noar 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [103/169] curl-0:8.15.0-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [104/169] elfutils-libs-0:0.193-3.fc43. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [105/169] elfutils-debuginfod-client-0: 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [106/169] libzstd-0:1.5.7-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [107/169] libxml2-0:2.12.10-4.fc43.x86_ 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [108/169] lz4-libs-0:1.10.0-3.fc43.x86_ 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [109/169] sqlite-libs-0:3.50.2-2.fc43.x 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [110/169] elfutils-default-yama-scope-0 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [111/169] json-c-0:0.18-7.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [112/169] rpm-libs-0:5.99.92-1.fc43.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [113/169] rpm-build-libs-0:5.99.92-1.fc 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [114/169] lua-libs-0:5.4.8-2.fc43.x86_6 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [115/169] rpm-sequoia-0:1.9.0-2.fc43.x8 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [116/169] rpm-sign-libs-0:5.99.92-1.fc4 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [117/169] libgomp-0:15.2.1-1.fc43.1.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [118/169] gnupg2-0:2.4.8-4.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [119/169] ima-evm-utils-libs-0:1.6.2-6. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [120/169] libfsverity-0:1.6-3.fc43.x86_ 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [121/169] gpgverify-0:2.2-3.fc43.noarch 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [122/169] gnupg2-dirmngr-0:2.4.8-4.fc43 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [123/169] gnupg2-gpg-agent-0:2.4.8-4.fc 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [124/169] gnupg2-gpgconf-0:2.4.8-4.fc43 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [125/169] gnupg2-keyboxd-0:2.4.8-4.fc43 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [126/169] gnupg2-verify-0:2.4.8-4.fc43. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [127/169] libassuan-0:2.5.7-4.fc43.x86_ 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [128/169] libgcrypt-0:1.11.1-2.fc43.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [129/169] libgpg-error-0:1.55-2.fc43.x8 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [130/169] npth-0:1.8-3.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [131/169] tpm2-tss-0:4.1.3-8.fc43.x86_6 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [132/169] gnutls-0:3.8.10-3.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [133/169] libksba-0:1.6.7-4.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [134/169] openldap-0:2.6.10-3.fc43.x86_ 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [135/169] libusb1-0:1.0.29-3.fc43.x86_6 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [136/169] libidn2-0:2.3.8-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [137/169] libtasn1-0:4.20.0-2.fc43.x86_ 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [138/169] libunistring-0:1.1-10.fc43.x8 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [139/169] nettle-0:3.10.1-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [140/169] p11-kit-0:0.25.5-9.fc43.x86_6 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [141/169] cyrus-sasl-lib-0:2.1.28-33.fc 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [142/169] libevent-0:2.1.12-16.fc43.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [143/169] libtool-ltdl-0:2.5.4-7.fc43.x 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [144/169] libffi-0:3.5.1-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [145/169] gdbm-libs-1:1.23-10.fc43.x86_ 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [146/169] p11-kit-trust-0:0.25.5-9.fc43 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [147/169] alternatives-0:1.33-2.fc43.x8 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [148/169] binutils-0:2.45-1.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [149/169] jansson-0:2.14-3.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [150/169] pkgconf-pkg-config-0:2.3.0-3. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [151/169] pkgconf-0:2.3.0-3.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [152/169] pkgconf-m4-0:2.3.0-3.fc43.noa 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [153/169] libpkgconf-0:2.3.0-3.fc43.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [154/169] fedora-release-0:43-0.22.noar 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [155/169] fedora-release-identity-basic 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [156/169] libcurl-0:8.15.0-2.fc43.x86_6 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [157/169] krb5-libs-0:1.21.3-7.fc43.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [158/169] libbrotli-0:1.1.0-9.fc43.x86_ 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [159/169] libnghttp2-0:1.66.0-2.fc43.x8 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [160/169] libpsl-0:0.21.5-6.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [161/169] libssh-0:0.11.2-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [162/169] keyutils-libs-0:1.6.3-6.fc43. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [163/169] libcom_err-0:1.47.3-2.fc43.x8 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [164/169] libverto-0:0.3.2-11.fc43.x86_ 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [165/169] publicsuffix-list-dafsa-0:202 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [166/169] libssh-config-0:0.11.2-2.fc43 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [167/169] gdb-minimal-0:16.3-5.fc43.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [168/169] xxhash-libs-0:0.8.3-3.fc43.x8 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [169/169] systemd-standalone-sysusers-0 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded -------------------------------------------------------------------------------- [169/169] Total 100% | 0.0 B/s | 0.0 B | 00m00s Running transaction Importing OpenPGP key 0x31645531: UserID : "Fedora (43) " Fingerprint: C6E7F081CF80E13146676E88829B606631645531 From : file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-43-primary The key was successfully imported. [ 1/171] Verify package files 100% | 775.0 B/s | 169.0 B | 00m00s >>> Running %pretrans scriptlet: filesystem-0:3.18-50.fc43.x86_64 >>> Finished %pretrans scriptlet: filesystem-0:3.18-50.fc43.x86_64 >>> [RPM] /var/lib/mock/fedora-43-x86_64-1756503654.411359/root/var/cache/dnf/co [ 2/171] Prepare transaction 100% | 4.0 KiB/s | 169.0 B | 00m00s [ 3/171] Installing libgcc-0:15.2.1-1. 100% | 262.0 MiB/s | 268.3 KiB | 00m00s [ 4/171] Installing libssh-config-0:0. 100% | 0.0 B/s | 816.0 B | 00m00s [ 5/171] Installing publicsuffix-list- 100% | 0.0 B/s | 69.8 KiB | 00m00s [ 6/171] Installing fedora-release-ide 100% | 0.0 B/s | 916.0 B | 00m00s [ 7/171] Installing fedora-gpg-keys-0: 100% | 43.7 MiB/s | 179.0 KiB | 00m00s [ 8/171] Installing fedora-repos-0:43- 100% | 0.0 B/s | 5.7 KiB | 00m00s [ 9/171] Installing fedora-release-com 100% | 24.2 MiB/s | 24.7 KiB | 00m00s [ 10/171] Installing fedora-release-0:4 100% | 20.2 KiB/s | 124.0 B | 00m00s >>> Running sysusers scriptlet: setup-0:2.15.0-26.fc43.noarch >>> Finished sysusers scriptlet: setup-0:2.15.0-26.fc43.noarch >>> Scriptlet output: >>> Creating group 'adm' with GID 4. >>> Creating group 'audio' with GID 63. >>> Creating group 'cdrom' with GID 11. >>> Creating group 'clock' with GID 103. >>> Creating group 'dialout' with GID 18. >>> Creating group 'disk' with GID 6. >>> Creating group 'floppy' with GID 19. >>> Creating group 'ftp' with GID 50. >>> Creating group 'games' with GID 20. >>> Creating group 'input' with GID 104. >>> Creating group 'kmem' with GID 9. >>> Creating group 'kvm' with GID 36. >>> Creating group 'lock' with GID 54. >>> Creating group 'lp' with GID 7. >>> Creating group 'mail' with GID 12. >>> Creating group 'man' with GID 15. >>> Creating group 'mem' with GID 8. >>> Creating group 'nobody' with GID 65534. >>> Creating group 'render' with GID 105. >>> Creating group 'root' with GID 0. >>> Creating group 'sgx' with GID 106. >>> Creating group 'sys' with GID 3. >>> Creating group 'tape' with GID 33. >>> Creating group 'tty' with GID 5. >>> Creating group 'users' with GID 100. >>> Creating group 'utmp' with GID 22. >>> Creating group 'video' with GID 39. >>> Creating group 'wheel' with GID 10. >>> Creating user 'adm' (adm) with UID 3 and GID 4. >>> Creating group 'bin' with GID 1. >>> Creating user 'bin' (bin) with UID 1 and GID 1. >>> Creating group 'daemon' with GID 2. >>> Creating user 'daemon' (daemon) with UID 2 and GID 2. >>> Creating user 'ftp' (FTP User) with UID 14 and GID 50. >>> Creating user 'games' (games) with UID 12 and GID 100. >>> Creating user 'halt' (halt) with UID 7 and GID 0. >>> Creating user 'lp' (lp) with UID 4 and GID 7. >>> Creating user 'mail' (mail) with UID 8 and GID 12. >>> Creating user 'nobody' (Kernel Overflow User) with UID 65534 and GID 65534. >>> Creating user 'operator' (operator) with UID 11 and GID 0. >>> Creating user 'root' (Super User) with UID 0 and GID 0. >>> Creating user 'shutdown' (shutdown) with UID 6 and GID 0. >>> Creating user 'sync' (sync) with UID 5 and GID 0. >>> [ 11/171] Installing setup-0:2.15.0-26. 100% | 51.0 MiB/s | 730.6 KiB | 00m00s >>> [RPM] /etc/hosts created as /etc/hosts.rpmnew [ 12/171] Installing filesystem-0:3.18- 100% | 2.9 MiB/s | 212.8 KiB | 00m00s [ 13/171] Installing pkgconf-m4-0:2.3.0 100% | 0.0 B/s | 14.8 KiB | 00m00s [ 14/171] Installing pcre2-syntax-0:10. 100% | 269.9 MiB/s | 276.4 KiB | 00m00s [ 15/171] Installing ncurses-base-0:6.5 100% | 86.3 MiB/s | 353.5 KiB | 00m00s [ 16/171] Installing bash-0:5.3.0-2.fc4 100% | 271.9 MiB/s | 8.4 MiB | 00m00s [ 17/171] Installing glibc-common-0:2.4 100% | 68.0 MiB/s | 1.0 MiB | 00m00s [ 18/171] Installing glibc-gconv-extra- 100% | 304.6 MiB/s | 7.3 MiB | 00m00s [ 19/171] Installing glibc-0:2.42-4.fc4 100% | 197.2 MiB/s | 6.7 MiB | 00m00s [ 20/171] Installing ncurses-libs-0:6.5 100% | 310.1 MiB/s | 952.8 KiB | 00m00s [ 21/171] Installing glibc-minimal-lang 100% | 0.0 B/s | 124.0 B | 00m00s [ 22/171] Installing zlib-ng-compat-0:2 100% | 135.2 MiB/s | 138.4 KiB | 00m00s [ 23/171] Installing bzip2-libs-0:1.0.8 100% | 79.8 MiB/s | 81.7 KiB | 00m00s [ 24/171] Installing libgpg-error-0:1.5 100% | 64.3 MiB/s | 921.1 KiB | 00m00s [ 25/171] Installing libstdc++-0:15.2.1 100% | 406.3 MiB/s | 2.8 MiB | 00m00s [ 26/171] Installing xz-libs-1:5.8.1-2. 100% | 213.8 MiB/s | 218.9 KiB | 00m00s [ 27/171] Installing libassuan-0:2.5.7- 100% | 161.7 MiB/s | 165.6 KiB | 00m00s [ 28/171] Installing libgcrypt-0:1.11.1 100% | 393.8 MiB/s | 1.6 MiB | 00m00s [ 29/171] Installing readline-0:8.3-2.f 100% | 501.8 MiB/s | 513.9 KiB | 00m00s [ 30/171] Installing gmp-1:6.3.0-4.fc43 100% | 397.2 MiB/s | 813.5 KiB | 00m00s [ 31/171] Installing libuuid-0:2.41.1-1 100% | 0.0 B/s | 38.3 KiB | 00m00s [ 32/171] Installing popt-0:1.19-9.fc43 100% | 68.1 MiB/s | 139.4 KiB | 00m00s [ 33/171] Installing npth-0:1.8-3.fc43. 100% | 0.0 B/s | 50.7 KiB | 00m00s [ 34/171] Installing libblkid-0:2.41.1- 100% | 257.4 MiB/s | 263.5 KiB | 00m00s [ 35/171] Installing libxcrypt-0:4.4.38 100% | 280.4 MiB/s | 287.2 KiB | 00m00s [ 36/171] Installing libzstd-0:1.5.7-2. 100% | 391.2 MiB/s | 801.1 KiB | 00m00s [ 37/171] Installing elfutils-libelf-0: 100% | 388.8 MiB/s | 1.2 MiB | 00m00s [ 38/171] Installing sqlite-libs-0:3.50 100% | 379.1 MiB/s | 1.5 MiB | 00m00s [ 39/171] Installing gnupg2-gpgconf-0:2 100% | 20.5 MiB/s | 252.0 KiB | 00m00s [ 40/171] Installing libattr-0:2.5.2-6. 100% | 0.0 B/s | 25.4 KiB | 00m00s [ 41/171] Installing libacl-0:2.3.2-4.f 100% | 0.0 B/s | 36.8 KiB | 00m00s [ 42/171] Installing libtasn1-0:4.20.0- 100% | 173.9 MiB/s | 178.1 KiB | 00m00s [ 43/171] Installing libunistring-0:1.1 100% | 431.7 MiB/s | 1.7 MiB | 00m00s [ 44/171] Installing libidn2-0:2.3.8-2. 100% | 60.6 MiB/s | 558.7 KiB | 00m00s [ 45/171] Installing crypto-policies-0: 100% | 42.0 MiB/s | 172.0 KiB | 00m00s [ 46/171] Installing dwz-0:0.16-2.fc43. 100% | 21.7 MiB/s | 288.5 KiB | 00m00s [ 47/171] Installing gnupg2-verify-0:2. 100% | 28.5 MiB/s | 349.9 KiB | 00m00s [ 48/171] Installing mpfr-0:4.2.2-2.fc4 100% | 407.4 MiB/s | 834.4 KiB | 00m00s [ 49/171] Installing gawk-0:5.3.2-2.fc4 100% | 106.8 MiB/s | 1.8 MiB | 00m00s [ 50/171] Installing libksba-0:1.6.7-4. 100% | 391.7 MiB/s | 401.1 KiB | 00m00s [ 51/171] Installing unzip-0:6.0-67.fc4 100% | 31.7 MiB/s | 389.8 KiB | 00m00s [ 52/171] Installing file-libs-0:5.46-7 100% | 697.5 MiB/s | 11.9 MiB | 00m00s [ 53/171] Installing file-0:5.46-7.fc43 100% | 8.3 MiB/s | 101.7 KiB | 00m00s [ 54/171] Installing pcre2-0:10.45-1.fc 100% | 341.4 MiB/s | 699.1 KiB | 00m00s [ 55/171] Installing grep-0:3.12-2.fc43 100% | 66.8 MiB/s | 1.0 MiB | 00m00s [ 56/171] Installing xz-1:5.8.1-2.fc43. 100% | 78.3 MiB/s | 1.3 MiB | 00m00s [ 57/171] Installing libeconf-0:0.7.9-2 100% | 65.0 MiB/s | 66.5 KiB | 00m00s [ 58/171] Installing libcap-ng-0:0.8.5- 100% | 69.2 MiB/s | 70.8 KiB | 00m00s [ 59/171] Installing audit-libs-0:4.1.1 100% | 186.3 MiB/s | 381.5 KiB | 00m00s [ 60/171] Installing pam-libs-0:1.7.1-3 100% | 126.0 MiB/s | 129.0 KiB | 00m00s [ 61/171] Installing libcap-0:2.76-3.fc 100% | 17.4 MiB/s | 214.3 KiB | 00m00s [ 62/171] Installing systemd-libs-0:257 100% | 372.0 MiB/s | 2.2 MiB | 00m00s [ 63/171] Installing libsmartcols-0:2.4 100% | 177.3 MiB/s | 181.6 KiB | 00m00s [ 64/171] Installing libsepol-0:3.9-2.f 100% | 401.8 MiB/s | 822.9 KiB | 00m00s [ 65/171] Installing libselinux-0:3.9-4 100% | 189.8 MiB/s | 194.4 KiB | 00m00s [ 66/171] Installing sed-0:4.9-5.fc43.x 100% | 60.4 MiB/s | 865.5 KiB | 00m00s [ 67/171] Installing findutils-1:4.10.0 100% | 116.1 MiB/s | 1.9 MiB | 00m00s [ 68/171] Installing libmount-0:2.41.1- 100% | 364.9 MiB/s | 373.7 KiB | 00m00s [ 69/171] Installing lz4-libs-0:1.10.0- 100% | 158.6 MiB/s | 162.5 KiB | 00m00s [ 70/171] Installing json-c-0:0.18-7.fc 100% | 0.0 B/s | 84.0 KiB | 00m00s [ 71/171] Installing lua-libs-0:5.4.8-2 100% | 275.3 MiB/s | 281.9 KiB | 00m00s [ 72/171] Installing libffi-0:3.5.1-2.f 100% | 83.0 MiB/s | 85.0 KiB | 00m00s [ 73/171] Installing p11-kit-0:0.25.5-9 100% | 115.0 MiB/s | 2.2 MiB | 00m00s [ 74/171] Installing alternatives-0:1.3 100% | 5.7 MiB/s | 63.8 KiB | 00m00s [ 75/171] Installing p11-kit-trust-0:0. 100% | 20.4 MiB/s | 397.1 KiB | 00m00s [ 76/171] Installing zstd-0:1.5.7-2.fc4 100% | 114.0 MiB/s | 1.7 MiB | 00m00s [ 77/171] Installing util-linux-core-0: 100% | 87.0 MiB/s | 1.5 MiB | 00m00s [ 78/171] Installing tar-2:1.35-6.fc43. 100% | 164.3 MiB/s | 3.0 MiB | 00m00s [ 79/171] Installing libsemanage-0:3.9- 100% | 303.0 MiB/s | 310.3 KiB | 00m00s [ 80/171] Installing systemd-standalone 100% | 22.6 MiB/s | 277.8 KiB | 00m00s [ 81/171] Installing libusb1-0:1.0.29-3 100% | 168.9 MiB/s | 172.9 KiB | 00m00s [ 82/171] Installing zip-0:3.0-44.fc43. 100% | 52.5 MiB/s | 698.4 KiB | 00m00s [ 83/171] Installing gnupg2-keyboxd-0:2 100% | 33.0 MiB/s | 202.7 KiB | 00m00s [ 84/171] Installing libpsl-0:0.21.5-6. 100% | 75.7 MiB/s | 77.5 KiB | 00m00s [ 85/171] Installing liblastlog2-0:2.41 100% | 8.8 MiB/s | 36.0 KiB | 00m00s [ 86/171] Installing libfdisk-0:2.41.1- 100% | 186.3 MiB/s | 381.5 KiB | 00m00s [ 87/171] Installing nettle-0:3.10.1-2. 100% | 258.4 MiB/s | 793.7 KiB | 00m00s [ 88/171] Installing gnutls-0:3.8.10-3. 100% | 383.9 MiB/s | 3.8 MiB | 00m00s [ 89/171] Installing libxml2-0:2.12.10- 100% | 106.5 MiB/s | 1.7 MiB | 00m00s [ 90/171] Installing bzip2-0:1.0.8-21.f 100% | 8.1 MiB/s | 99.8 KiB | 00m00s [ 91/171] Installing add-determinism-0: 100% | 143.7 MiB/s | 2.4 MiB | 00m00s [ 92/171] Installing build-reproducibil 100% | 0.0 B/s | 1.0 KiB | 00m00s [ 93/171] Installing cpio-0:2.15-6.fc43 100% | 78.5 MiB/s | 1.1 MiB | 00m00s [ 94/171] Installing diffutils-0:3.12-3 100% | 97.6 MiB/s | 1.6 MiB | 00m00s [ 95/171] Installing ed-0:1.22.2-1.fc43 100% | 12.2 MiB/s | 150.4 KiB | 00m00s [ 96/171] Installing patch-0:2.8-2.fc43 100% | 18.3 MiB/s | 224.3 KiB | 00m00s [ 97/171] Installing libgomp-0:15.2.1-1 100% | 264.8 MiB/s | 542.4 KiB | 00m00s [ 98/171] Installing libtool-ltdl-0:2.5 100% | 0.0 B/s | 71.2 KiB | 00m00s [ 99/171] Installing gdbm-libs-1:1.23-1 100% | 128.5 MiB/s | 131.6 KiB | 00m00s [100/171] Installing cyrus-sasl-lib-0:2 100% | 143.5 MiB/s | 2.3 MiB | 00m00s [101/171] Installing jansson-0:2.14-3.f 100% | 88.3 MiB/s | 90.5 KiB | 00m00s [102/171] Installing libpkgconf-0:2.3.0 100% | 0.0 B/s | 79.2 KiB | 00m00s [103/171] Installing pkgconf-0:2.3.0-3. 100% | 8.1 MiB/s | 91.0 KiB | 00m00s [104/171] Installing pkgconf-pkg-config 100% | 177.3 KiB/s | 1.8 KiB | 00m00s [105/171] Installing libbrotli-0:1.1.0- 100% | 272.0 MiB/s | 835.6 KiB | 00m00s [106/171] Installing libnghttp2-0:1.66. 100% | 159.5 MiB/s | 163.3 KiB | 00m00s [107/171] Installing keyutils-libs-0:1. 100% | 0.0 B/s | 55.7 KiB | 00m00s [108/171] Installing libcom_err-0:1.47. 100% | 0.0 B/s | 64.2 KiB | 00m00s [109/171] Installing libverto-0:0.3.2-1 100% | 0.0 B/s | 27.2 KiB | 00m00s [110/171] Installing xxhash-libs-0:0.8. 100% | 89.4 MiB/s | 91.6 KiB | 00m00s [111/171] Installing filesystem-srpm-ma 100% | 0.0 B/s | 38.9 KiB | 00m00s [112/171] Installing elfutils-default-y 100% | 408.6 KiB/s | 2.0 KiB | 00m00s [113/171] Installing elfutils-libs-0:0. 100% | 223.1 MiB/s | 685.2 KiB | 00m00s [114/171] Installing coreutils-common-0 100% | 418.2 MiB/s | 11.3 MiB | 00m00s [115/171] Installing openssl-libs-1:3.5 100% | 445.1 MiB/s | 8.9 MiB | 00m00s [116/171] Installing coreutils-0:9.7-5. 100% | 170.2 MiB/s | 5.4 MiB | 00m00s [117/171] Installing ca-certificates-0: 100% | 2.2 MiB/s | 2.5 MiB | 00m01s [118/171] Installing libarchive-0:3.8.1 100% | 310.2 MiB/s | 953.1 KiB | 00m00s [119/171] Installing krb5-libs-0:1.21.3 100% | 176.3 MiB/s | 2.3 MiB | 00m00s >>> Running sysusers scriptlet: tpm2-tss-0:4.1.3-8.fc43.x86_64 >>> Finished sysusers scriptlet: tpm2-tss-0:4.1.3-8.fc43.x86_64 >>> Scriptlet output: >>> Creating group 'tss' with GID 59. >>> Creating user 'tss' (Account used for TPM access) with UID 59 and GID 59. >>> [120/171] Installing tpm2-tss-0:4.1.3-8 100% | 262.0 MiB/s | 1.6 MiB | 00m00s [121/171] Installing ima-evm-utils-libs 100% | 60.5 MiB/s | 62.0 KiB | 00m00s [122/171] Installing gnupg2-gpg-agent-0 100% | 33.0 MiB/s | 675.4 KiB | 00m00s [123/171] Installing libssh-0:0.11.2-2. 100% | 277.7 MiB/s | 568.7 KiB | 00m00s [124/171] Installing gzip-0:1.13-4.fc43 100% | 29.6 MiB/s | 394.4 KiB | 00m00s [125/171] Installing rpm-sequoia-0:1.9. 100% | 413.1 MiB/s | 2.5 MiB | 00m00s [126/171] Installing rpm-libs-0:5.99.92 100% | 304.4 MiB/s | 935.3 KiB | 00m00s [127/171] Installing libfsverity-0:1.6- 100% | 0.0 B/s | 29.5 KiB | 00m00s [128/171] Installing libevent-0:2.1.12- 100% | 288.7 MiB/s | 886.8 KiB | 00m00s [129/171] Installing openldap-0:2.6.10- 100% | 322.1 MiB/s | 659.6 KiB | 00m00s [130/171] Installing libcurl-0:8.15.0-2 100% | 294.4 MiB/s | 904.3 KiB | 00m00s [131/171] Installing elfutils-debuginfo 100% | 7.0 MiB/s | 86.2 KiB | 00m00s [132/171] Installing elfutils-0:0.193-3 100% | 162.1 MiB/s | 2.9 MiB | 00m00s [133/171] Installing binutils-0:2.45-1. 100% | 344.7 MiB/s | 26.5 MiB | 00m00s [134/171] Installing gdb-minimal-0:16.3 100% | 301.3 MiB/s | 13.3 MiB | 00m00s [135/171] Installing debugedit-0:5.2-2. 100% | 16.3 MiB/s | 200.5 KiB | 00m00s [136/171] Installing curl-0:8.15.0-2.fc 100% | 23.3 MiB/s | 476.3 KiB | 00m00s [137/171] Installing rpm-0:5.99.92-1.fc 100% | 83.1 MiB/s | 2.5 MiB | 00m00s [138/171] Installing efi-srpm-macros-0: 100% | 40.2 MiB/s | 41.1 KiB | 00m00s [139/171] Installing java-srpm-macros-0 100% | 0.0 B/s | 1.1 KiB | 00m00s [140/171] Installing lua-srpm-macros-0: 100% | 0.0 B/s | 1.9 KiB | 00m00s [141/171] Installing tree-sitter-srpm-m 100% | 0.0 B/s | 9.3 KiB | 00m00s [142/171] Installing zig-srpm-macros-0: 100% | 0.0 B/s | 1.7 KiB | 00m00s [143/171] Installing gnupg2-dirmngr-0:2 100% | 31.9 MiB/s | 621.1 KiB | 00m00s [144/171] Installing gnupg2-0:2.4.8-4.f 100% | 234.0 MiB/s | 6.6 MiB | 00m00s [145/171] Installing rpm-sign-libs-0:5. 100% | 39.6 MiB/s | 40.6 KiB | 00m00s [146/171] Installing rpm-build-libs-0:5 100% | 266.8 MiB/s | 273.2 KiB | 00m00s [147/171] Installing gpgverify-0:2.2-3. 100% | 0.0 B/s | 9.4 KiB | 00m00s [148/171] Installing rust-srpm-macros-0 100% | 0.0 B/s | 5.6 KiB | 00m00s [149/171] Installing qt6-srpm-macros-0: 100% | 0.0 B/s | 740.0 B | 00m00s [150/171] Installing qt5-srpm-macros-0: 100% | 0.0 B/s | 776.0 B | 00m00s [151/171] Installing perl-srpm-macros-0 100% | 0.0 B/s | 1.1 KiB | 00m00s [152/171] Installing package-notes-srpm 100% | 0.0 B/s | 2.0 KiB | 00m00s [153/171] Installing openblas-srpm-macr 100% | 0.0 B/s | 392.0 B | 00m00s [154/171] Installing ocaml-srpm-macros- 100% | 0.0 B/s | 2.1 KiB | 00m00s [155/171] Installing kernel-srpm-macros 100% | 0.0 B/s | 2.3 KiB | 00m00s [156/171] Installing gnat-srpm-macros-0 100% | 0.0 B/s | 1.3 KiB | 00m00s [157/171] Installing ghc-srpm-macros-0: 100% | 0.0 B/s | 1.0 KiB | 00m00s [158/171] Installing gap-srpm-macros-0: 100% | 0.0 B/s | 2.6 KiB | 00m00s [159/171] Installing fpc-srpm-macros-0: 100% | 0.0 B/s | 420.0 B | 00m00s [160/171] Installing ansible-srpm-macro 100% | 0.0 B/s | 36.2 KiB | 00m00s [161/171] Installing rpm-build-0:5.99.9 100% | 22.1 MiB/s | 294.4 KiB | 00m00s [162/171] Installing pyproject-srpm-mac 100% | 0.0 B/s | 2.5 KiB | 00m00s [163/171] Installing redhat-rpm-config- 100% | 92.3 MiB/s | 189.1 KiB | 00m00s [164/171] Installing forge-srpm-macros- 100% | 0.0 B/s | 40.3 KiB | 00m00s [165/171] Installing fonts-srpm-macros- 100% | 0.0 B/s | 57.0 KiB | 00m00s [166/171] Installing go-srpm-macros-0:3 100% | 61.3 MiB/s | 62.7 KiB | 00m00s [167/171] Installing python-srpm-macros 100% | 0.0 B/s | 52.8 KiB | 00m00s [168/171] Installing which-0:2.23-3.fc4 100% | 6.4 MiB/s | 85.7 KiB | 00m00s [169/171] Installing util-linux-0:2.41. 100% | 108.2 MiB/s | 3.6 MiB | 00m00s [170/171] Installing shadow-utils-2:4.1 100% | 141.8 MiB/s | 4.0 MiB | 00m00s [171/171] Installing info-0:7.2-6.fc43. 100% | 237.4 KiB/s | 354.3 KiB | 00m01s Warning: skipped OpenPGP checks for 5 packages from repository: copr_base Complete! Finish: installing minimal buildroot with dnf5 Start: creating root cache Finish: creating root cache Finish: chroot init INFO: Installed packages: INFO: add-determinism-0.6.0-2.fc43.x86_64 alternatives-1.33-2.fc43.x86_64 ansible-srpm-macros-1-18.1.fc43.noarch audit-libs-4.1.1-2.fc43.x86_64 bash-5.3.0-2.fc43.x86_64 binutils-2.45-1.fc43.x86_64 build-reproducibility-srpm-macros-0.6.0-2.fc43.noarch bzip2-1.0.8-21.fc43.x86_64 bzip2-libs-1.0.8-21.fc43.x86_64 ca-certificates-2025.2.80_v9.0.304-1.0.fc43.noarch coreutils-9.7-5.fc43.x86_64 coreutils-common-9.7-5.fc43.x86_64 cpio-2.15-6.fc43.x86_64 crypto-policies-20250714-4.gitcd6043a.fc43.noarch curl-8.15.0-2.fc43.x86_64 cyrus-sasl-lib-2.1.28-33.fc43.x86_64 debugedit-5.2-2.fc43.x86_64 diffutils-3.12-3.fc43.x86_64 dwz-0.16-2.fc43.x86_64 ed-1.22.2-1.fc43.x86_64 efi-srpm-macros-6-4.fc43.noarch elfutils-0.193-3.fc43.x86_64 elfutils-debuginfod-client-0.193-3.fc43.x86_64 elfutils-default-yama-scope-0.193-3.fc43.noarch elfutils-libelf-0.193-3.fc43.x86_64 elfutils-libs-0.193-3.fc43.x86_64 fedora-gpg-keys-43-0.4.noarch fedora-release-43-0.22.noarch fedora-release-common-43-0.22.noarch fedora-release-identity-basic-43-0.22.noarch fedora-repos-43-0.4.noarch file-5.46-7.fc43.x86_64 file-libs-5.46-7.fc43.x86_64 filesystem-3.18-50.fc43.x86_64 filesystem-srpm-macros-3.18-50.fc43.noarch findutils-4.10.0-6.fc43.x86_64 fonts-srpm-macros-2.0.5-23.fc43.noarch forge-srpm-macros-0.4.0-3.fc43.noarch fpc-srpm-macros-1.3-15.fc43.noarch gap-srpm-macros-1-1.fc43.noarch gawk-5.3.2-2.fc43.x86_64 gdb-minimal-16.3-5.fc43.x86_64 gdbm-libs-1.23-10.fc43.x86_64 ghc-srpm-macros-1.9.2-3.fc43.noarch glibc-2.42-4.fc43.x86_64 glibc-common-2.42-4.fc43.x86_64 glibc-gconv-extra-2.42-4.fc43.x86_64 glibc-minimal-langpack-2.42-4.fc43.x86_64 gmp-6.3.0-4.fc43.x86_64 gnat-srpm-macros-6-8.fc43.noarch gnupg2-2.4.8-4.fc43.x86_64 gnupg2-dirmngr-2.4.8-4.fc43.x86_64 gnupg2-gpg-agent-2.4.8-4.fc43.x86_64 gnupg2-gpgconf-2.4.8-4.fc43.x86_64 gnupg2-keyboxd-2.4.8-4.fc43.x86_64 gnupg2-verify-2.4.8-4.fc43.x86_64 gnutls-3.8.10-3.fc43.x86_64 go-srpm-macros-3.7.0-4.fc43.noarch gpg-pubkey-c6e7f081cf80e13146676e88829b606631645531-66b6dccf gpgverify-2.2-3.fc43.noarch grep-3.12-2.fc43.x86_64 gzip-1.13-4.fc43.x86_64 ima-evm-utils-libs-1.6.2-6.fc43.x86_64 info-7.2-6.fc43.x86_64 jansson-2.14-3.fc43.x86_64 java-srpm-macros-1-7.fc43.noarch json-c-0.18-7.fc43.x86_64 kernel-srpm-macros-1.0-27.fc43.noarch keyutils-libs-1.6.3-6.fc43.x86_64 krb5-libs-1.21.3-7.fc43.x86_64 libacl-2.3.2-4.fc43.x86_64 libarchive-3.8.1-3.fc43.x86_64 libassuan-2.5.7-4.fc43.x86_64 libattr-2.5.2-6.fc43.x86_64 libblkid-2.41.1-16.fc43.x86_64 libbrotli-1.1.0-9.fc43.x86_64 libcap-2.76-3.fc43.x86_64 libcap-ng-0.8.5-7.fc43.x86_64 libcom_err-1.47.3-2.fc43.x86_64 libcurl-8.15.0-2.fc43.x86_64 libeconf-0.7.9-2.fc43.x86_64 libevent-2.1.12-16.fc43.x86_64 libfdisk-2.41.1-16.fc43.x86_64 libffi-3.5.1-2.fc43.x86_64 libfsverity-1.6-3.fc43.x86_64 libgcc-15.2.1-1.fc43.1.x86_64 libgcrypt-1.11.1-2.fc43.x86_64 libgomp-15.2.1-1.fc43.1.x86_64 libgpg-error-1.55-2.fc43.x86_64 libidn2-2.3.8-2.fc43.x86_64 libksba-1.6.7-4.fc43.x86_64 liblastlog2-2.41.1-16.fc43.x86_64 libmount-2.41.1-16.fc43.x86_64 libnghttp2-1.66.0-2.fc43.x86_64 libpkgconf-2.3.0-3.fc43.x86_64 libpsl-0.21.5-6.fc43.x86_64 libselinux-3.9-4.fc43.x86_64 libsemanage-3.9-3.fc43.x86_64 libsepol-3.9-2.fc43.x86_64 libsmartcols-2.41.1-16.fc43.x86_64 libssh-0.11.2-2.fc43.x86_64 libssh-config-0.11.2-2.fc43.noarch libstdc++-15.2.1-1.fc43.1.x86_64 libtasn1-4.20.0-2.fc43.x86_64 libtool-ltdl-2.5.4-7.fc43.x86_64 libunistring-1.1-10.fc43.x86_64 libusb1-1.0.29-3.fc43.x86_64 libuuid-2.41.1-16.fc43.x86_64 libverto-0.3.2-11.fc43.x86_64 libxcrypt-4.4.38-8.fc43.x86_64 libxml2-2.12.10-4.fc43.x86_64 libzstd-1.5.7-2.fc43.x86_64 lua-libs-5.4.8-2.fc43.x86_64 lua-srpm-macros-1-16.fc43.noarch lz4-libs-1.10.0-3.fc43.x86_64 mpfr-4.2.2-2.fc43.x86_64 ncurses-base-6.5-7.20250614.fc43.noarch ncurses-libs-6.5-7.20250614.fc43.x86_64 nettle-3.10.1-2.fc43.x86_64 npth-1.8-3.fc43.x86_64 ocaml-srpm-macros-11-2.fc43.noarch openblas-srpm-macros-2-20.fc43.noarch openldap-2.6.10-3.fc43.x86_64 openssl-libs-3.5.1-2.fc43.x86_64 p11-kit-0.25.5-9.fc43.x86_64 p11-kit-trust-0.25.5-9.fc43.x86_64 package-notes-srpm-macros-0.5-14.fc43.noarch pam-libs-1.7.1-3.fc43.x86_64 patch-2.8-2.fc43.x86_64 pcre2-10.45-1.fc43.1.x86_64 pcre2-syntax-10.45-1.fc43.1.noarch perl-srpm-macros-1-60.fc43.noarch pkgconf-2.3.0-3.fc43.x86_64 pkgconf-m4-2.3.0-3.fc43.noarch pkgconf-pkg-config-2.3.0-3.fc43.x86_64 popt-1.19-9.fc43.x86_64 publicsuffix-list-dafsa-20250616-2.fc43.noarch pyproject-srpm-macros-1.18.3-2.fc43.noarch python-srpm-macros-3.14-5.fc43.noarch qt5-srpm-macros-5.15.17-2.fc43.noarch qt6-srpm-macros-6.9.1-2.fc43.noarch readline-8.3-2.fc43.x86_64 redhat-rpm-config-343-11.fc43.noarch rpm-5.99.92-1.fc43.x86_64 rpm-build-5.99.92-1.fc43.x86_64 rpm-build-libs-5.99.92-1.fc43.x86_64 rpm-libs-5.99.92-1.fc43.x86_64 rpm-sequoia-1.9.0-2.fc43.x86_64 rpm-sign-libs-5.99.92-1.fc43.x86_64 rust-srpm-macros-26.4-1.fc43.noarch sed-4.9-5.fc43.x86_64 setup-2.15.0-26.fc43.noarch shadow-utils-4.18.0-3.fc43.x86_64 sqlite-libs-3.50.2-2.fc43.x86_64 systemd-libs-257.7-1.fc43.x86_64 systemd-standalone-sysusers-257.7-1.fc43.x86_64 tar-1.35-6.fc43.x86_64 tpm2-tss-4.1.3-8.fc43.x86_64 tree-sitter-srpm-macros-0.4.2-1.fc43.noarch unzip-6.0-67.fc43.x86_64 util-linux-2.41.1-16.fc43.x86_64 util-linux-core-2.41.1-16.fc43.x86_64 which-2.23-3.fc43.x86_64 xxhash-libs-0.8.3-3.fc43.x86_64 xz-5.8.1-2.fc43.x86_64 xz-libs-5.8.1-2.fc43.x86_64 zig-srpm-macros-1-5.fc43.noarch zip-3.0-44.fc43.x86_64 zlib-ng-compat-2.2.5-1.fc43.x86_64 zstd-1.5.7-2.fc43.x86_64 Start: buildsrpm Start: rpmbuild -bs Building target platforms: x86_64 Building for target x86_64 setting SOURCE_DATE_EPOCH=1755216000 Wrote: /builddir/build/SRPMS/python-django-allauth-65.3.0-5.fc43.src.rpm Finish: rpmbuild -bs INFO: chroot_scan: 1 files copied to /var/lib/copr-rpmbuild/results/chroot_scan INFO: /var/lib/mock/fedora-43-x86_64-1756503654.411359/root/var/log/dnf5.log INFO: chroot_scan: creating tarball /var/lib/copr-rpmbuild/results/chroot_scan.tar.gz /bin/tar: Removing leading `/' from member names Finish: buildsrpm INFO: Done(/var/lib/copr-rpmbuild/workspace/workdir-g4bfk2sc/python-django-allauth/python-django-allauth.spec) Config(child) 0 minutes 10 seconds INFO: Results and/or logs in: /var/lib/copr-rpmbuild/results INFO: Cleaning up build root ('cleanup_on_success=True') Start: clean chroot INFO: unmounting tmpfs. Finish: clean chroot INFO: Start(/var/lib/copr-rpmbuild/results/python-django-allauth-65.3.0-5.fc43.src.rpm) Config(fedora-43-x86_64) Start(bootstrap): chroot init INFO: mounting tmpfs at /var/lib/mock/fedora-43-x86_64-bootstrap-1756503654.411359/root. INFO: reusing tmpfs at /var/lib/mock/fedora-43-x86_64-bootstrap-1756503654.411359/root. INFO: calling preinit hooks INFO: enabled root cache INFO: enabled package manager cache Start(bootstrap): cleaning package manager metadata Finish(bootstrap): cleaning package manager metadata Finish(bootstrap): chroot init Start: chroot init INFO: mounting tmpfs at /var/lib/mock/fedora-43-x86_64-1756503654.411359/root. INFO: calling preinit hooks INFO: enabled root cache Start: unpacking root cache Finish: unpacking root cache INFO: enabled package manager cache Start: cleaning package manager metadata Finish: cleaning package manager metadata INFO: enabled HW Info plugin INFO: Buildroot is handled by package management downloaded with a bootstrap image: rpm-5.99.91-5.fc43.x86_64 rpm-sequoia-1.9.0-2.fc43.x86_64 dnf5-5.2.16.0-3.fc43.x86_64 dnf5-plugins-5.2.16.0-3.fc43.x86_64 Finish: chroot init Start: build phase for python-django-allauth-65.3.0-5.fc43.src.rpm Start: build setup for python-django-allauth-65.3.0-5.fc43.src.rpm Building target platforms: x86_64 Building for target x86_64 setting SOURCE_DATE_EPOCH=1755216000 Wrote: /builddir/build/SRPMS/python-django-allauth-65.3.0-5.fc43.src.rpm Updating and loading repositories: Copr repository 100% | 24.5 KiB/s | 1.5 KiB | 00m00s fedora 100% | 94.4 KiB/s | 25.6 KiB | 00m00s updates 100% | 263.8 KiB/s | 31.1 KiB | 00m00s Repositories loaded. Package Arch Version Repository Size Installing: python3-devel x86_64 3.14.0~rc2-1.fc43 copr_base 1.9 MiB python3-setuptools noarch 78.1.1-12.fc43 fedora 9.0 MiB Installing dependencies: expat x86_64 2.7.1-3.fc43 fedora 294.2 KiB mpdecimal x86_64 4.0.1-2.fc43 fedora 217.2 KiB pyproject-rpm-macros noarch 1.18.3-2.fc43 fedora 114.5 KiB python-pip-wheel noarch 25.2-2.fc43 copr_base 1.2 MiB python-rpm-macros noarch 3.14-5.fc43 fedora 23.2 KiB python3 x86_64 3.14.0~rc2-1.fc43 copr_base 28.9 KiB python3-libs x86_64 3.14.0~rc2-1.fc43 copr_base 42.9 MiB python3-packaging noarch 25.0-5.fc43 fedora 607.4 KiB python3-rpm-generators noarch 14-13.fc43 fedora 81.7 KiB python3-rpm-macros noarch 3.14-5.fc43 fedora 6.5 KiB tzdata noarch 2025b-3.fc43 fedora 1.6 MiB Transaction Summary: Installing: 13 packages Total size of inbound packages is 14 MiB. Need to download 0 B. After this operation, 58 MiB extra will be used (install 58 MiB, remove 0 B). [ 1/13] python3-setuptools-0:78.1.1-12. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 2/13] python3-devel-0:3.14.0~rc2-1.fc 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 3/13] python3-0:3.14.0~rc2-1.fc43.x86 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 4/13] python3-libs-0:3.14.0~rc2-1.fc4 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 5/13] expat-0:2.7.1-3.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 6/13] mpdecimal-0:4.0.1-2.fc43.x86_64 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 7/13] tzdata-0:2025b-3.fc43.noarch 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 8/13] python-pip-wheel-0:25.2-2.fc43. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 9/13] pyproject-rpm-macros-0:1.18.3-2 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [10/13] python-rpm-macros-0:3.14-5.fc43 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [11/13] python3-rpm-generators-0:14-13. 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [12/13] python3-rpm-macros-0:3.14-5.fc4 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [13/13] python3-packaging-0:25.0-5.fc43 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded -------------------------------------------------------------------------------- [13/13] Total 100% | 0.0 B/s | 0.0 B | 00m00s Running transaction [ 1/15] Verify package files 100% | 236.0 B/s | 13.0 B | 00m00s [ 2/15] Prepare transaction 100% | 448.0 B/s | 13.0 B | 00m00s [ 3/15] Installing python-rpm-macros-0: 100% | 23.4 MiB/s | 23.9 KiB | 00m00s [ 4/15] Installing python3-rpm-macros-0 100% | 0.0 B/s | 6.8 KiB | 00m00s [ 5/15] Installing pyproject-rpm-macros 100% | 113.7 MiB/s | 116.5 KiB | 00m00s [ 6/15] Installing python-pip-wheel-0:2 100% | 235.8 MiB/s | 1.2 MiB | 00m00s [ 7/15] Installing tzdata-0:2025b-3.fc4 100% | 67.6 MiB/s | 1.9 MiB | 00m00s [ 8/15] Installing mpdecimal-0:4.0.1-2. 100% | 213.7 MiB/s | 218.8 KiB | 00m00s [ 9/15] Installing expat-0:2.7.1-3.fc43 100% | 17.0 MiB/s | 296.3 KiB | 00m00s [10/15] Installing python3-libs-0:3.14. 100% | 355.0 MiB/s | 43.3 MiB | 00m00s [11/15] Installing python3-0:3.14.0~rc2 100% | 2.5 MiB/s | 30.7 KiB | 00m00s [12/15] Installing python3-packaging-0: 100% | 201.8 MiB/s | 619.9 KiB | 00m00s [13/15] Installing python3-rpm-generato 100% | 81.0 MiB/s | 82.9 KiB | 00m00s [14/15] Installing python3-devel-0:3.14 100% | 94.8 MiB/s | 2.0 MiB | 00m00s [15/15] Installing python3-setuptools-0 100% | 180.8 MiB/s | 9.2 MiB | 00m00s Warning: skipped OpenPGP checks for 4 packages from repository: copr_base Complete! Finish: build setup for python-django-allauth-65.3.0-5.fc43.src.rpm Start: rpmbuild python-django-allauth-65.3.0-5.fc43.src.rpm Building target platforms: x86_64 Building for target x86_64 setting SOURCE_DATE_EPOCH=1755216000 Executing(%mkbuilddir): /bin/sh -e /var/tmp/rpm-tmp.zF6wtI Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.Gyorrj + umask 022 + cd /builddir/build/BUILD/python-django-allauth-65.3.0-build + cd /builddir/build/BUILD/python-django-allauth-65.3.0-build + rm -rf django-allauth + /usr/lib/rpm/rpmuncompress -x /builddir/build/SOURCES/django-allauth-65.3.0.tar.gz + STATUS=0 + '[' 0 -ne 0 ']' + cd django-allauth + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . + /usr/lib/rpm/rpmuncompress /builddir/build/SOURCES/django-allauth-relax-coverage-version.diff + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch -f + /usr/lib/rpm/rpmuncompress /builddir/build/SOURCES/django-allauth-lower_pytest-asyncio_req.diff + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch -f + RPM_EC=0 ++ jobs -p + exit 0 Executing(%generate_buildrequires): /bin/sh -e /var/tmp/rpm-tmp.iJNLRC + umask 022 + cd /builddir/build/BUILD/python-django-allauth-65.3.0-build + cd django-allauth + echo pyproject-rpm-macros + echo python3-devel + echo 'python3dist(packaging)' + echo 'python3dist(pip) >= 19' + '[' -f pyproject.toml ']' + echo '(python3dist(tomli) if python3-devel < 3.11)' + rm -rfv '*.dist-info/' + '[' -f /usr/bin/python3 ']' + mkdir -p /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir + echo -n + CFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + CXXFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + FFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + FCFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + VALAFLAGS=-g + RUSTFLAGS='-Copt-level=3 -Cdebuginfo=2 -Ccodegen-units=1 -Cstrip=none -Cforce-frame-pointers=yes --cap-lints=warn' + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,pack-relative-relocs -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-hardened-ld-errors -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,--build-id=sha1 ' + LT_SYS_LIBRARY_PATH=/usr/lib64: + CC=gcc + CXX=g++ + TMPDIR=/builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir + RPM_TOXENV=py314 + FEDORA=43 + HOSTNAME=rpmbuild + /usr/bin/python3 -Bs /usr/lib/rpm/redhat/pyproject_buildrequires.py --generate-extras --python3_pkgversion 3 --wheeldir /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/pyproject-wheeldir --output /builddir/build/BUILD/python-django-allauth-65.3.0-build/python-django-allauth-65.3.0-5.fc43.x86_64-pyproject-buildrequires -t -x mfa,openid,saml,socialaccount,steam Handling setuptools>=40.8.0 from build-system.requires Requirement satisfied: setuptools>=40.8.0 (installed: setuptools 78.1.1) /usr/lib/python3.14/site-packages/setuptools/dist.py:759: SetuptoolsDeprecationWarning: License classifiers are deprecated. !! ******************************************************************************** Please consider removing the following classifiers in favor of a SPDX license expression: License :: OSI Approved :: MIT License See https://packaging.python.org/en/latest/guides/writing-pyproject-toml/#license for details. ******************************************************************************** !! self._finalize_license_expression() running egg_info creating django_allauth.egg-info writing django_allauth.egg-info/PKG-INFO writing dependency_links to django_allauth.egg-info/dependency_links.txt writing requirements to django_allauth.egg-info/requires.txt writing top-level names to django_allauth.egg-info/top_level.txt writing manifest file 'django_allauth.egg-info/SOURCES.txt' reading manifest file 'django_allauth.egg-info/SOURCES.txt' reading manifest template 'MANIFEST.in' warning: no files found matching '*.mo' under directory 'allauth' adding license file 'LICENSE' adding license file 'AUTHORS' writing manifest file 'django_allauth.egg-info/SOURCES.txt' Handling tox-current-env >= 0.0.16 from tox itself Requirement not satisfied: tox-current-env >= 0.0.16 Exiting dependency generation pass: tox itself + cat /builddir/build/BUILD/python-django-allauth-65.3.0-build/python-django-allauth-65.3.0-5.fc43.x86_64-pyproject-buildrequires + rm -rfv '*.dist-info/' + RPM_EC=0 ++ jobs -p + exit 0 Wrote: /builddir/build/SRPMS/python-django-allauth-65.3.0-5.fc43.buildreqs.nosrc.rpm INFO: Going to install missing dynamic buildrequires Updating and loading repositories: Copr repository 100% | 20.5 KiB/s | 1.5 KiB | 00m00s fedora 100% | 61.3 KiB/s | 25.6 KiB | 00m00s updates 100% | 87.2 KiB/s | 31.1 KiB | 00m00s Repositories loaded. Package "pyproject-rpm-macros-1.18.3-2.fc43.noarch" is already installed. Package "python3-devel-3.14.0~rc2-1.fc43.x86_64" is already installed. Package "python3-setuptools-78.1.1-12.fc43.noarch" is already installed. Package "python3-packaging-25.0-5.fc43.noarch" is already installed. Package "python3-setuptools-78.1.1-12.fc43.noarch" is already installed. Package Arch Version Repository Size Installing: python3-pip noarch 25.2-2.fc43 copr_base 11.3 MiB python3-tox-current-env noarch 0.0.16-6.fc43 fedora 78.4 KiB Installing dependencies: python-setuptools-wheel noarch 78.1.1-12.fc43 fedora 1.1 MiB python3-cachetools noarch 6.2.0-1.fc43 copr_base 152.1 KiB python3-chardet noarch 5.2.0-21.fc43 fedora 2.1 MiB python3-colorama noarch 0.4.6-13.fc43 fedora 190.4 KiB python3-distlib noarch 0.4.0-1.fc43 fedora 1.2 MiB python3-filelock noarch 3.15.4-9.fc43 fedora 97.0 KiB python3-platformdirs noarch 4.2.2-7.fc43 fedora 177.6 KiB python3-pluggy noarch 1.6.0-3.fc43 fedora 211.0 KiB python3-pyproject-api noarch 1.9.1-4.fc43 fedora 85.0 KiB python3-virtualenv noarch 20.33.1-3.fc43 fedora 706.0 KiB tox noarch 4.26.0-5.fc43 fedora 1.4 MiB Transaction Summary: Installing: 13 packages Total size of inbound packages is 5 MiB. Need to download 3 MiB. After this operation, 19 MiB extra will be used (install 19 MiB, remove 0 B). [ 1/13] python3-pip-0:25.2-2.fc43.noarc 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 2/13] python3-pluggy-0:1.6.0-3.fc43.n 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 3/13] python3-chardet-0:5.2.0-21.fc43 100% | 16.1 MiB/s | 296.5 KiB | 00m00s [ 4/13] python3-tox-current-env-0:0.0.1 100% | 1.2 MiB/s | 31.8 KiB | 00m00s [ 5/13] python3-colorama-0:0.4.6-13.fc4 100% | 6.4 MiB/s | 71.6 KiB | 00m00s [ 6/13] python3-platformdirs-0:4.2.2-7. 100% | 1.3 MiB/s | 48.9 KiB | 00m00s [ 7/13] python3-pyproject-api-0:1.9.1-4 100% | 8.5 MiB/s | 43.4 KiB | 00m00s [ 8/13] python3-filelock-0:3.15.4-9.fc4 100% | 798.0 KiB/s | 44.7 KiB | 00m00s [ 9/13] tox-0:4.26.0-5.fc43.noarch 100% | 5.3 MiB/s | 456.9 KiB | 00m00s [10/13] python3-virtualenv-0:20.33.1-3. 100% | 23.0 MiB/s | 305.6 KiB | 00m00s [11/13] python3-distlib-0:0.4.0-1.fc43. 100% | 13.9 MiB/s | 270.9 KiB | 00m00s [12/13] python-setuptools-wheel-0:78.1. 100% | 43.4 MiB/s | 1.1 MiB | 00m00s [13/13] python3-cachetools-0:6.2.0-1.fc 100% | 637.6 KiB/s | 44.6 KiB | 00m00s -------------------------------------------------------------------------------- [13/13] Total 100% | 16.5 MiB/s | 2.7 MiB | 00m00s Running transaction [ 1/15] Verify package files 100% | 684.0 B/s | 13.0 B | 00m00s [ 2/15] Prepare transaction 100% | 650.0 B/s | 13.0 B | 00m00s [ 3/15] Installing python3-platformdirs 100% | 179.7 MiB/s | 184.0 KiB | 00m00s [ 4/15] Installing python3-filelock-0:3 100% | 101.4 MiB/s | 103.9 KiB | 00m00s [ 5/15] Installing python3-cachetools-0 100% | 153.4 MiB/s | 157.0 KiB | 00m00s [ 6/15] Installing python3-distlib-0:0. 100% | 399.3 MiB/s | 1.2 MiB | 00m00s [ 7/15] Installing python-setuptools-wh 100% | 573.9 MiB/s | 1.1 MiB | 00m00s [ 8/15] Installing python3-virtualenv-0 100% | 37.9 MiB/s | 775.7 KiB | 00m00s [ 9/15] Installing python3-pyproject-ap 100% | 89.0 MiB/s | 91.2 KiB | 00m00s [10/15] Installing python3-pluggy-0:1.6 100% | 212.4 MiB/s | 217.5 KiB | 00m00s [11/15] Installing python3-colorama-0:0 100% | 97.8 MiB/s | 200.3 KiB | 00m00s [12/15] Installing python3-chardet-0:5. 100% | 112.2 MiB/s | 2.1 MiB | 00m00s [13/15] Installing tox-0:4.26.0-5.fc43. 100% | 66.3 MiB/s | 1.5 MiB | 00m00s [14/15] Installing python3-tox-current- 100% | 27.0 MiB/s | 82.9 KiB | 00m00s [15/15] Installing python3-pip-0:25.2-2 100% | 155.8 MiB/s | 11.5 MiB | 00m00s Warning: skipped OpenPGP checks for 2 packages from repository: copr_base Complete! Building target platforms: x86_64 Building for target x86_64 setting SOURCE_DATE_EPOCH=1755216000 Executing(%generate_buildrequires): /bin/sh -e /var/tmp/rpm-tmp.rKqT6P + umask 022 + cd /builddir/build/BUILD/python-django-allauth-65.3.0-build + cd django-allauth + echo pyproject-rpm-macros + echo python3-devel + echo 'python3dist(packaging)' + echo 'python3dist(pip) >= 19' + '[' -f pyproject.toml ']' + echo '(python3dist(tomli) if python3-devel < 3.11)' + rm -rfv '*.dist-info/' + '[' -f /usr/bin/python3 ']' + mkdir -p /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir + echo -n + CFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + CXXFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + FFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + FCFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + VALAFLAGS=-g + RUSTFLAGS='-Copt-level=3 -Cdebuginfo=2 -Ccodegen-units=1 -Cstrip=none -Cforce-frame-pointers=yes --cap-lints=warn' + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,pack-relative-relocs -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-hardened-ld-errors -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,--build-id=sha1 ' + LT_SYS_LIBRARY_PATH=/usr/lib64: + CC=gcc + CXX=g++ + TMPDIR=/builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir + RPM_TOXENV=py314 + FEDORA=43 + HOSTNAME=rpmbuild + /usr/bin/python3 -Bs /usr/lib/rpm/redhat/pyproject_buildrequires.py --generate-extras --python3_pkgversion 3 --wheeldir /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/pyproject-wheeldir --output /builddir/build/BUILD/python-django-allauth-65.3.0-build/python-django-allauth-65.3.0-5.fc43.x86_64-pyproject-buildrequires -t -x mfa,openid,saml,socialaccount,steam Handling setuptools>=40.8.0 from build-system.requires Requirement satisfied: setuptools>=40.8.0 (installed: setuptools 78.1.1) /usr/lib/python3.14/site-packages/setuptools/dist.py:759: SetuptoolsDeprecationWarning: License classifiers are deprecated. !! ******************************************************************************** Please consider removing the following classifiers in favor of a SPDX license expression: License :: OSI Approved :: MIT License See https://packaging.python.org/en/latest/guides/writing-pyproject-toml/#license for details. ******************************************************************************** !! self._finalize_license_expression() running egg_info writing django_allauth.egg-info/PKG-INFO writing dependency_links to django_allauth.egg-info/dependency_links.txt writing requirements to django_allauth.egg-info/requires.txt writing top-level names to django_allauth.egg-info/top_level.txt reading manifest file 'django_allauth.egg-info/SOURCES.txt' reading manifest template 'MANIFEST.in' warning: no files found matching '*.mo' under directory 'allauth' adding license file 'LICENSE' adding license file 'AUTHORS' writing manifest file 'django_allauth.egg-info/SOURCES.txt' Handling tox-current-env >= 0.0.16 from tox itself Requirement satisfied: tox-current-env >= 0.0.16 (installed: tox-current-env 0.0.16) py314: OK (0.00 seconds) congratulations :) (0.07 seconds) Handling tox from tox --print-deps-only: py314 Requirement satisfied: tox (installed: tox 4.26.0) Handling coverage from tox --print-deps-only: py314 Requirement not satisfied: coverage Handling Pillow>=9.0 from tox --print-deps-only: py314 Requirement not satisfied: Pillow>=9.0 Handling pytest>=7.4 from tox --print-deps-only: py314 Requirement not satisfied: pytest>=7.4 Handling pytest-asyncio >= 0.23.6 from tox --print-deps-only: py314 Requirement not satisfied: pytest-asyncio >= 0.23.6 Handling pytest-django>=4.5.2 from tox --print-deps-only: py314 Requirement not satisfied: pytest-django>=4.5.2 Handling python3-saml>=1.15.0,<2.0.0 from tox --print-deps-only: py314 Requirement not satisfied: python3-saml>=1.15.0,<2.0.0 py314: OK (0.00 seconds) congratulations :) (0.07 seconds) running dist_info writing django_allauth.egg-info/PKG-INFO writing dependency_links to django_allauth.egg-info/dependency_links.txt writing requirements to django_allauth.egg-info/requires.txt writing top-level names to django_allauth.egg-info/top_level.txt reading manifest file 'django_allauth.egg-info/SOURCES.txt' reading manifest template 'MANIFEST.in' warning: no files found matching '*.mo' under directory 'allauth' adding license file 'LICENSE' adding license file 'AUTHORS' writing manifest file 'django_allauth.egg-info/SOURCES.txt' creating '/builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/django_allauth-65.3.0.dist-info' Handling Django>=4.2.16 from hook generated metadata: Requires-Dist (django-allauth) Requirement not satisfied: Django>=4.2.16 Handling asgiref>=3.8.1 from hook generated metadata: Requires-Dist (django-allauth) Requirement not satisfied: asgiref>=3.8.1 Handling qrcode>=7.0.0; extra == "mfa" from hook generated metadata: Requires-Dist (django-allauth) Requirement not satisfied: qrcode>=7.0.0; extra == "mfa" Handling fido2>=1.1.2; extra == "mfa" from hook generated metadata: Requires-Dist (django-allauth) Requirement not satisfied: fido2>=1.1.2; extra == "mfa" Handling python3-openid>=3.0.8; extra == "openid" from hook generated metadata: Requires-Dist (django-allauth) Requirement not satisfied: python3-openid>=3.0.8; extra == "openid" Handling python3-saml<2.0.0,>=1.15.0; extra == "saml" from hook generated metadata: Requires-Dist (django-allauth) Requirement not satisfied: python3-saml<2.0.0,>=1.15.0; extra == "saml" Handling python3-openid>=3.0.8; extra == "steam" from hook generated metadata: Requires-Dist (django-allauth) Requirement not satisfied: python3-openid>=3.0.8; extra == "steam" Handling requests-oauthlib>=0.3.0; extra == "socialaccount" from hook generated metadata: Requires-Dist (django-allauth) Requirement not satisfied: requests-oauthlib>=0.3.0; extra == "socialaccount" Handling requests>=2.0.0; extra == "socialaccount" from hook generated metadata: Requires-Dist (django-allauth) Requirement not satisfied: requests>=2.0.0; extra == "socialaccount" Handling pyjwt[crypto]>=1.7; extra == "socialaccount" from hook generated metadata: Requires-Dist (django-allauth) Requirement not satisfied: pyjwt[crypto]>=1.7; extra == "socialaccount" + cat /builddir/build/BUILD/python-django-allauth-65.3.0-build/python-django-allauth-65.3.0-5.fc43.x86_64-pyproject-buildrequires + rm -rfv django_allauth-65.3.0.dist-info/ removed 'django_allauth-65.3.0.dist-info/licenses/AUTHORS' removed 'django_allauth-65.3.0.dist-info/licenses/LICENSE' removed directory 'django_allauth-65.3.0.dist-info/licenses' removed 'django_allauth-65.3.0.dist-info/METADATA' removed 'django_allauth-65.3.0.dist-info/top_level.txt' removed directory 'django_allauth-65.3.0.dist-info/' + RPM_EC=0 ++ jobs -p + exit 0 Wrote: /builddir/build/SRPMS/python-django-allauth-65.3.0-5.fc43.buildreqs.nosrc.rpm INFO: Going to install missing dynamic buildrequires Updating and loading repositories: Copr repository 100% | 24.9 KiB/s | 1.5 KiB | 00m00s fedora 100% | 67.7 KiB/s | 25.6 KiB | 00m00s updates 100% | 263.8 KiB/s | 31.1 KiB | 00m00s Repositories loaded. Package "pyproject-rpm-macros-1.18.3-2.fc43.noarch" is already installed. Package "python3-devel-3.14.0~rc2-1.fc43.x86_64" is already installed. Package "python3-setuptools-78.1.1-12.fc43.noarch" is already installed. Package "python3-packaging-25.0-5.fc43.noarch" is already installed. Package "python3-pip-25.2-2.fc43.noarch" is already installed. Package "python3-setuptools-78.1.1-12.fc43.noarch" is already installed. Package "tox-4.26.0-5.fc43.noarch" is already installed. Package "python3-tox-current-env-0.0.16-6.fc43.noarch" is already installed. Package Arch Version Repository Size Installing: python3-asgiref noarch 3.8.1-5.fc43 fedora 164.1 KiB python3-coverage x86_64 7.10.2-2.fc43 fedora 2.0 MiB python3-django noarch 5.2.4-3.fc43 fedora 21.5 MiB python3-fido2 noarch 2.0.0-2.fc43 fedora 1.6 MiB python3-jwt noarch 2.8.0-6.fc43 fedora 178.9 KiB python3-jwt+crypto noarch 2.8.0-6.fc43 fedora 5.4 KiB python3-openid noarch 3.1.0-28.fc43 fedora 1.1 MiB python3-pillow x86_64 11.3.0-4.fc43 fedora 4.2 MiB python3-pytest noarch 8.3.5-8.fc43 fedora 21.6 MiB python3-pytest-asyncio noarch 1.1.0-1.fc43 copr_base 130.7 KiB python3-pytest-django noarch 4.9.0-4.fc43 fedora 198.0 KiB python3-qrcode noarch 8.0-8.fc43 fedora 394.9 KiB python3-requests noarch 2.32.5-1.fc43 copr_base 476.9 KiB python3-requests-oauthlib noarch 1.3.1-14.fc43 fedora 134.1 KiB python3-saml noarch 1.16.0-10.fc43 fedora 845.5 KiB Installing dependencies: freetype x86_64 2.13.3-3.fc43 fedora 850.2 KiB fribidi x86_64 1.0.16-3.fc43 fedora 190.3 KiB glib2 x86_64 2.85.4-1.fc43 fedora 14.7 MiB graphite2 x86_64 1.3.14-19.fc43 fedora 191.8 KiB harfbuzz x86_64 11.4.1-1.fc43 fedora 2.8 MiB jbigkit-libs x86_64 2.1-32.fc43 fedora 113.5 KiB lcms2 x86_64 2.16-6.fc43 fedora 433.7 KiB libXau x86_64 1.0.12-3.fc43 fedora 72.9 KiB libimagequant x86_64 4.0.3-8.fc43 fedora 690.9 KiB libjpeg-turbo x86_64 3.1.1-2.fc43 fedora 799.5 KiB liblerc x86_64 4.0.0-9.fc43 fedora 624.1 KiB libpng x86_64 2:1.6.50-2.fc43 fedora 237.7 KiB libraqm x86_64 0.10.1-3.fc43 fedora 28.6 KiB libtiff x86_64 4.7.0-8.fc43 fedora 619.0 KiB libwebp x86_64 1.6.0-2.fc43 fedora 956.6 KiB libxcb x86_64 1.17.0-6.fc43 fedora 1.1 MiB libxslt x86_64 1.1.43-4.fc43 fedora 460.1 KiB openjpeg x86_64 2.5.3-8.fc43 fedora 455.7 KiB python3-cffi x86_64 1.17.1-5.fc43 fedora 1.4 MiB python3-charset-normalizer noarch 3.4.3-2.fc43 fedora 355.7 KiB python3-cryptography x86_64 45.0.4-3.fc43 fedora 5.4 MiB python3-defusedxml noarch 0.7.1-21.fc43 fedora 197.6 KiB python3-idna noarch 3.10-5.fc43 fedora 730.6 KiB python3-iniconfig noarch 2.1.0-2.fc43 fedora 42.4 KiB python3-isodate noarch 0.7.2-5.fc43 fedora 124.7 KiB python3-lxml x86_64 6.0.1-1.fc43 copr_base 5.8 MiB python3-oauthlib noarch 3.2.2-9.fc43 fedora 996.3 KiB python3-olefile noarch 0.47-10.fc43 fedora 346.5 KiB python3-ply noarch 3.11-29.fc43 fedora 575.2 KiB python3-pycparser noarch 2.22-4.fc43 fedora 1.5 MiB python3-sqlparse noarch 0.5.3-2.fc43 fedora 386.3 KiB python3-urllib3 noarch 2.5.0-2.fc43 fedora 1.1 MiB python3-xmlsec x86_64 1.3.14-5.fc43 fedora 155.9 KiB xmlsec1 x86_64 1:1.2.41-3.fc43 fedora 547.1 KiB xmlsec1-openssl x86_64 1:1.2.41-3.fc43 fedora 277.0 KiB Transaction Summary: Installing: 50 packages Total size of inbound packages is 23 MiB. Need to download 21 MiB. After this operation, 99 MiB extra will be used (install 99 MiB, remove 0 B). [ 1/50] python3-pytest-0:8.3.5-8.fc43.n 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 2/50] python3-iniconfig-0:2.1.0-2.fc4 100% | 0.0 B/s | 0.0 B | 00m00s >>> Already downloaded [ 3/50] python3-asgiref-0:3.8.1-5.fc43. 100% | 294.0 KiB/s | 65.6 KiB | 00m00s [ 4/50] python3-saml-0:1.16.0-10.fc43.n 100% | 608.5 KiB/s | 165.5 KiB | 00m00s [ 5/50] python3-coverage-0:7.10.2-2.fc4 100% | 1.3 MiB/s | 442.5 KiB | 00m00s [ 6/50] python3-jwt-0:2.8.0-6.fc43.noar 100% | 1.6 MiB/s | 70.2 KiB | 00m00s [ 7/50] python3-fido2-0:2.0.0-2.fc43.no 100% | 3.4 MiB/s | 391.7 KiB | 00m00s [ 8/50] python3-jwt+crypto-0:2.8.0-6.fc 100% | 226.2 KiB/s | 8.8 KiB | 00m00s [ 9/50] python3-pytest-django-0:4.9.0-4 100% | 1.5 MiB/s | 65.4 KiB | 00m00s [10/50] python3-qrcode-0:8.0-8.fc43.noa 100% | 2.8 MiB/s | 137.4 KiB | 00m00s [11/50] python3-openid-0:3.1.0-28.fc43. 100% | 4.8 MiB/s | 277.9 KiB | 00m00s [12/50] python3-requests-oauthlib-0:1.3 100% | 1.3 MiB/s | 58.5 KiB | 00m00s [13/50] python3-django-0:5.2.4-3.fc43.n 100% | 18.5 MiB/s | 5.9 MiB | 00m00s [14/50] python3-pillow-0:11.3.0-4.fc43. 100% | 9.7 MiB/s | 1.0 MiB | 00m00s [15/50] python3-requests-0:2.32.5-1.fc4 100% | 2.6 MiB/s | 150.6 KiB | 00m00s [16/50] python3-pytest-asyncio-0:1.1.0- 100% | 493.6 KiB/s | 41.5 KiB | 00m00s [17/50] python3-isodate-0:0.7.2-5.fc43. 100% | 1.2 MiB/s | 54.4 KiB | 00m00s [18/50] python3-xmlsec-0:1.3.14-5.fc43. 100% | 1.2 MiB/s | 48.5 KiB | 00m00s [19/50] python3-sqlparse-0:0.5.3-2.fc43 100% | 2.9 MiB/s | 125.0 KiB | 00m00s [20/50] python3-defusedxml-0:0.7.1-21.f 100% | 1.4 MiB/s | 59.0 KiB | 00m00s [21/50] python3-oauthlib-0:3.2.2-9.fc43 100% | 5.5 MiB/s | 255.0 KiB | 00m00s [22/50] freetype-0:2.13.3-3.fc43.x86_64 100% | 9.6 MiB/s | 412.1 KiB | 00m00s [23/50] lcms2-0:2.16-6.fc43.x86_64 100% | 4.2 MiB/s | 182.8 KiB | 00m00s [24/50] python3-cryptography-0:45.0.4-3 100% | 11.8 MiB/s | 1.5 MiB | 00m00s [25/50] libimagequant-0:4.0.3-8.fc43.x8 100% | 7.1 MiB/s | 313.8 KiB | 00m00s [26/50] libjpeg-turbo-0:3.1.1-2.fc43.x8 100% | 5.1 MiB/s | 236.1 KiB | 00m00s [27/50] libraqm-0:0.10.1-3.fc43.x86_64 100% | 560.3 KiB/s | 22.4 KiB | 00m00s [28/50] libtiff-0:4.7.0-8.fc43.x86_64 100% | 5.3 MiB/s | 221.1 KiB | 00m00s [29/50] libwebp-0:1.6.0-2.fc43.x86_64 100% | 6.9 MiB/s | 324.2 KiB | 00m00s [30/50] libxcb-0:1.17.0-6.fc43.x86_64 100% | 5.4 MiB/s | 237.7 KiB | 00m00s [31/50] openjpeg-0:2.5.3-8.fc43.x86_64 100% | 4.6 MiB/s | 192.1 KiB | 00m00s [32/50] python3-olefile-0:0.47-10.fc43. 100% | 1.8 MiB/s | 74.8 KiB | 00m00s [33/50] python3-charset-normalizer-0:3. 100% | 2.8 MiB/s | 117.2 KiB | 00m00s [34/50] python3-idna-0:3.10-5.fc43.noar 100% | 3.0 MiB/s | 124.0 KiB | 00m00s [35/50] python3-urllib3-0:2.5.0-2.fc43. 100% | 6.5 MiB/s | 297.4 KiB | 00m00s [36/50] xmlsec1-1:1.2.41-3.fc43.x86_64 100% | 4.4 MiB/s | 187.4 KiB | 00m00s [37/50] python3-cffi-0:1.17.1-5.fc43.x8 100% | 7.4 MiB/s | 319.7 KiB | 00m00s [38/50] libpng-2:1.6.50-2.fc43.x86_64 100% | 2.9 MiB/s | 123.0 KiB | 00m00s [39/50] fribidi-0:1.0.16-3.fc43.x86_64 100% | 1.3 MiB/s | 53.3 KiB | 00m00s [40/50] harfbuzz-0:11.4.1-1.fc43.x86_64 100% | 16.9 MiB/s | 1.1 MiB | 00m00s [41/50] jbigkit-libs-0:2.1-32.fc43.x86_ 100% | 1.3 MiB/s | 53.2 KiB | 00m00s [42/50] liblerc-0:4.0.0-9.fc43.x86_64 100% | 5.1 MiB/s | 215.1 KiB | 00m00s [43/50] libXau-0:1.0.12-3.fc43.x86_64 100% | 836.2 KiB/s | 33.4 KiB | 00m00s [44/50] libxslt-0:1.1.43-4.fc43.x86_64 100% | 4.3 MiB/s | 184.4 KiB | 00m00s [45/50] python3-pycparser-0:2.22-4.fc43 100% | 6.4 MiB/s | 274.4 KiB | 00m00s [46/50] graphite2-0:1.3.14-19.fc43.x86_ 100% | 2.3 MiB/s | 95.6 KiB | 00m00s [47/50] python3-ply-0:3.11-29.fc43.noar 100% | 3.3 MiB/s | 136.8 KiB | 00m00s [48/50] glib2-0:2.85.4-1.fc43.x86_64 100% | 29.9 MiB/s | 3.1 MiB | 00m00s [49/50] xmlsec1-openssl-1:1.2.41-3.fc43 100% | 2.2 MiB/s | 92.3 KiB | 00m00s [50/50] python3-lxml-0:6.0.1-1.fc43.x86 100% | 18.9 MiB/s | 1.6 MiB | 00m00s -------------------------------------------------------------------------------- [50/50] Total 100% | 17.8 MiB/s | 21.0 MiB | 00m01s Running transaction [ 1/52] Verify package files 100% | 609.0 B/s | 50.0 B | 00m00s [ 2/52] Prepare transaction 100% | 694.0 B/s | 50.0 B | 00m00s [ 3/52] Installing libxslt-0:1.1.43-4.f 100% | 30.2 MiB/s | 463.2 KiB | 00m00s [ 4/52] Installing xmlsec1-1:1.2.41-3.f 100% | 41.3 MiB/s | 549.2 KiB | 00m00s [ 5/52] Installing python3-lxml-0:6.0.1 100% | 323.6 MiB/s | 5.8 MiB | 00m00s [ 6/52] Installing python3-idna-0:3.10- 100% | 359.9 MiB/s | 737.1 KiB | 00m00s [ 7/52] Installing libwebp-0:1.6.0-2.fc 100% | 312.7 MiB/s | 960.7 KiB | 00m00s [ 8/52] Installing libjpeg-turbo-0:3.1. 100% | 391.2 MiB/s | 801.2 KiB | 00m00s [ 9/52] Installing python3-urllib3-0:2. 100% | 277.8 MiB/s | 1.1 MiB | 00m00s [10/52] Installing xmlsec1-openssl-1:1. 100% | 271.5 MiB/s | 278.0 KiB | 00m00s [11/52] Installing python3-xmlsec-0:1.3 100% | 155.7 MiB/s | 159.5 KiB | 00m00s [12/52] Installing python3-ply-0:3.11-2 100% | 283.4 MiB/s | 580.4 KiB | 00m00s [13/52] Installing python3-pycparser-0: 100% | 376.3 MiB/s | 1.5 MiB | 00m00s [14/52] Installing python3-cffi-0:1.17. 100% | 273.1 MiB/s | 1.4 MiB | 00m00s [15/52] Installing python3-cryptography 100% | 287.4 MiB/s | 5.5 MiB | 00m00s [16/52] Installing graphite2-0:1.3.14-1 100% | 14.6 MiB/s | 193.9 KiB | 00m00s [17/52] Installing glib2-0:2.85.4-1.fc4 100% | 313.7 MiB/s | 14.7 MiB | 00m00s [18/52] Installing libXau-0:1.0.12-3.fc 100% | 72.7 MiB/s | 74.5 KiB | 00m00s [19/52] Installing libxcb-0:1.17.0-6.fc 100% | 270.0 MiB/s | 1.1 MiB | 00m00s [20/52] Installing liblerc-0:4.0.0-9.fc 100% | 305.5 MiB/s | 625.6 KiB | 00m00s [21/52] Installing jbigkit-libs-0:2.1-3 100% | 112.7 MiB/s | 115.4 KiB | 00m00s [22/52] Installing libtiff-0:4.7.0-8.fc 100% | 303.4 MiB/s | 621.3 KiB | 00m00s [23/52] Installing fribidi-0:1.0.16-3.f 100% | 15.7 MiB/s | 192.8 KiB | 00m00s [24/52] Installing libpng-2:1.6.50-2.fc 100% | 233.4 MiB/s | 239.0 KiB | 00m00s [25/52] Installing freetype-0:2.13.3-3. 100% | 277.3 MiB/s | 851.9 KiB | 00m00s [26/52] Installing harfbuzz-0:11.4.1-1. 100% | 405.3 MiB/s | 2.8 MiB | 00m00s [27/52] Installing libraqm-0:0.10.1-3.f 100% | 29.0 MiB/s | 29.7 KiB | 00m00s [28/52] Installing python3-charset-norm 100% | 27.5 MiB/s | 365.8 KiB | 00m00s [29/52] Installing python3-requests-0:2 100% | 238.7 MiB/s | 488.9 KiB | 00m00s [30/52] Installing python3-olefile-0:0. 100% | 341.6 MiB/s | 349.8 KiB | 00m00s [31/52] Installing openjpeg-0:2.5.3-8.f 100% | 223.5 MiB/s | 457.7 KiB | 00m00s [32/52] Installing libimagequant-0:4.0. 100% | 338.2 MiB/s | 692.5 KiB | 00m00s [33/52] Installing lcms2-0:2.16-6.fc43. 100% | 212.6 MiB/s | 435.3 KiB | 00m00s [34/52] Installing python3-oauthlib-0:3 100% | 170.2 MiB/s | 1.0 MiB | 00m00s [35/52] Installing python3-defusedxml-0 100% | 201.2 MiB/s | 206.0 KiB | 00m00s [36/52] Installing python3-iniconfig-0: 100% | 15.1 MiB/s | 46.5 KiB | 00m00s [37/52] Installing python3-pytest-0:8.3 100% | 369.4 MiB/s | 21.8 MiB | 00m00s [38/52] Installing python3-sqlparse-0:0 100% | 28.0 MiB/s | 401.2 KiB | 00m00s [39/52] Installing python3-isodate-0:0. 100% | 129.9 MiB/s | 133.0 KiB | 00m00s [40/52] Installing python3-jwt-0:2.8.0- 100% | 91.6 MiB/s | 187.6 KiB | 00m00s [41/52] Installing python3-asgiref-0:3. 100% | 14.0 MiB/s | 171.7 KiB | 00m00s [42/52] Installing python3-django-0:5.2 100% | 92.6 MiB/s | 22.8 MiB | 00m00s [43/52] Installing python3-jwt+crypto-0 100% | 0.0 B/s | 124.0 B | 00m00s [44/52] Installing python3-saml-0:1.16. 100% | 279.9 MiB/s | 859.9 KiB | 00m00s [45/52] Installing python3-pytest-djang 100% | 200.3 MiB/s | 205.1 KiB | 00m00s [46/52] Installing python3-pytest-async 100% | 131.6 MiB/s | 134.8 KiB | 00m00s [47/52] Installing python3-openid-0:3.1 100% | 228.1 MiB/s | 1.1 MiB | 00m00s [48/52] Installing python3-requests-oau 100% | 71.6 MiB/s | 146.5 KiB | 00m00s [49/52] Installing python3-pillow-0:11. 100% | 331.1 MiB/s | 4.3 MiB | 00m00s [50/52] Installing python3-fido2-0:2.0. 100% | 273.3 MiB/s | 1.6 MiB | 00m00s [51/52] Installing python3-qrcode-0:8.0 100% | 27.2 MiB/s | 418.1 KiB | 00m00s [52/52] Installing python3-coverage-0:7 100% | 35.6 MiB/s | 2.0 MiB | 00m00s Warning: skipped OpenPGP checks for 3 packages from repository: copr_base Complete! Building target platforms: x86_64 Building for target x86_64 setting SOURCE_DATE_EPOCH=1755216000 Executing(%generate_buildrequires): /bin/sh -e /var/tmp/rpm-tmp.efWDTj + umask 022 + cd /builddir/build/BUILD/python-django-allauth-65.3.0-build + cd django-allauth + echo pyproject-rpm-macros + echo python3-devel + echo 'python3dist(packaging)' + echo 'python3dist(pip) >= 19' + '[' -f pyproject.toml ']' + echo '(python3dist(tomli) if python3-devel < 3.11)' + rm -rfv '*.dist-info/' + '[' -f /usr/bin/python3 ']' + mkdir -p /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir + echo -n + CFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + CXXFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + FFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + FCFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + VALAFLAGS=-g + RUSTFLAGS='-Copt-level=3 -Cdebuginfo=2 -Ccodegen-units=1 -Cstrip=none -Cforce-frame-pointers=yes --cap-lints=warn' + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,pack-relative-relocs -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-hardened-ld-errors -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,--build-id=sha1 ' + LT_SYS_LIBRARY_PATH=/usr/lib64: + CC=gcc + CXX=g++ + TMPDIR=/builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir + RPM_TOXENV=py314 + FEDORA=43 + HOSTNAME=rpmbuild + /usr/bin/python3 -Bs /usr/lib/rpm/redhat/pyproject_buildrequires.py --generate-extras --python3_pkgversion 3 --wheeldir /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/pyproject-wheeldir --output /builddir/build/BUILD/python-django-allauth-65.3.0-build/python-django-allauth-65.3.0-5.fc43.x86_64-pyproject-buildrequires -t -x mfa,openid,saml,socialaccount,steam Handling setuptools>=40.8.0 from build-system.requires Requirement satisfied: setuptools>=40.8.0 (installed: setuptools 78.1.1) /usr/lib/python3.14/site-packages/setuptools/dist.py:759: SetuptoolsDeprecationWarning: License classifiers are deprecated. !! ******************************************************************************** Please consider removing the following classifiers in favor of a SPDX license expression: License :: OSI Approved :: MIT License See https://packaging.python.org/en/latest/guides/writing-pyproject-toml/#license for details. ******************************************************************************** !! self._finalize_license_expression() running egg_info writing django_allauth.egg-info/PKG-INFO writing dependency_links to django_allauth.egg-info/dependency_links.txt writing requirements to django_allauth.egg-info/requires.txt writing top-level names to django_allauth.egg-info/top_level.txt reading manifest file 'django_allauth.egg-info/SOURCES.txt' reading manifest template 'MANIFEST.in' warning: no files found matching '*.mo' under directory 'allauth' adding license file 'LICENSE' adding license file 'AUTHORS' writing manifest file 'django_allauth.egg-info/SOURCES.txt' Handling tox-current-env >= 0.0.16 from tox itself Requirement satisfied: tox-current-env >= 0.0.16 (installed: tox-current-env 0.0.16) py314: OK (0.00 seconds) congratulations :) (0.07 seconds) Handling tox from tox --print-deps-only: py314 Requirement satisfied: tox (installed: tox 4.26.0) Handling coverage from tox --print-deps-only: py314 Requirement satisfied: coverage (installed: coverage 7.10.2) Handling Pillow>=9.0 from tox --print-deps-only: py314 Requirement satisfied: Pillow>=9.0 (installed: Pillow 11.3.0) Handling pytest>=7.4 from tox --print-deps-only: py314 Requirement satisfied: pytest>=7.4 (installed: pytest 8.3.5) Handling pytest-asyncio >= 0.23.6 from tox --print-deps-only: py314 Requirement satisfied: pytest-asyncio >= 0.23.6 (installed: pytest-asyncio 1.1.0) Handling pytest-django>=4.5.2 from tox --print-deps-only: py314 Requirement satisfied: pytest-django>=4.5.2 (installed: pytest-django 4.9.0) Handling python3-saml>=1.15.0,<2.0.0 from tox --print-deps-only: py314 Requirement satisfied: python3-saml>=1.15.0,<2.0.0 (installed: python3-saml 1.16.0) py314: OK (0.00 seconds) congratulations :) (0.07 seconds) running dist_info writing django_allauth.egg-info/PKG-INFO writing dependency_links to django_allauth.egg-info/dependency_links.txt writing requirements to django_allauth.egg-info/requires.txt writing top-level names to django_allauth.egg-info/top_level.txt reading manifest file 'django_allauth.egg-info/SOURCES.txt' reading manifest template 'MANIFEST.in' warning: no files found matching '*.mo' under directory 'allauth' adding license file 'LICENSE' adding license file 'AUTHORS' writing manifest file 'django_allauth.egg-info/SOURCES.txt' creating '/builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/django_allauth-65.3.0.dist-info' Handling Django>=4.2.16 from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: Django>=4.2.16 (installed: Django 5.2.4) Handling asgiref>=3.8.1 from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: asgiref>=3.8.1 (installed: asgiref 3.8.1) Handling qrcode>=7.0.0; extra == "mfa" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: qrcode>=7.0.0; extra == "mfa" (installed: qrcode 8.0) Handling fido2>=1.1.2; extra == "mfa" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: fido2>=1.1.2; extra == "mfa" (installed: fido2 2.0.0) Handling python3-openid>=3.0.8; extra == "openid" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: python3-openid>=3.0.8; extra == "openid" (installed: python3-openid 3.1.0) Handling python3-saml<2.0.0,>=1.15.0; extra == "saml" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: python3-saml<2.0.0,>=1.15.0; extra == "saml" (installed: python3-saml 1.16.0) Handling python3-openid>=3.0.8; extra == "steam" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: python3-openid>=3.0.8; extra == "steam" (installed: python3-openid 3.1.0) Handling requests-oauthlib>=0.3.0; extra == "socialaccount" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: requests-oauthlib>=0.3.0; extra == "socialaccount" (installed: requests-oauthlib 1.3.1) Handling requests>=2.0.0; extra == "socialaccount" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: requests>=2.0.0; extra == "socialaccount" (installed: requests 2.32.5) Handling pyjwt[crypto]>=1.7; extra == "socialaccount" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: pyjwt[crypto]>=1.7; extra == "socialaccount" (installed: pyjwt 2.8.0) (extras are currently not checked) + cat /builddir/build/BUILD/python-django-allauth-65.3.0-build/python-django-allauth-65.3.0-5.fc43.x86_64-pyproject-buildrequires + rm -rfv django_allauth-65.3.0.dist-info/ removed 'django_allauth-65.3.0.dist-info/licenses/AUTHORS' removed 'django_allauth-65.3.0.dist-info/licenses/LICENSE' removed directory 'django_allauth-65.3.0.dist-info/licenses' removed 'django_allauth-65.3.0.dist-info/METADATA' removed 'django_allauth-65.3.0.dist-info/top_level.txt' removed directory 'django_allauth-65.3.0.dist-info/' + RPM_EC=0 ++ jobs -p + exit 0 Wrote: /builddir/build/SRPMS/python-django-allauth-65.3.0-5.fc43.buildreqs.nosrc.rpm INFO: Going to install missing dynamic buildrequires Updating and loading repositories: Copr repository 100% | 23.3 KiB/s | 1.5 KiB | 00m00s fedora 100% | 92.0 KiB/s | 25.6 KiB | 00m00s updates 100% | 144.8 KiB/s | 31.1 KiB | 00m00s Repositories loaded. Nothing to do. Package "pyproject-rpm-macros-1.18.3-2.fc43.noarch" is already installed. Package "python3-devel-3.14.0~rc2-1.fc43.x86_64" is already installed. Package "python3-setuptools-78.1.1-12.fc43.noarch" is already installed. Package "python3-asgiref-3.8.1-5.fc43.noarch" is already installed. Package "python3-coverage-7.10.2-2.fc43.x86_64" is already installed. Package "python3-django-5.2.4-3.fc43.noarch" is already installed. Package "python3-fido2-2.0.0-2.fc43.noarch" is already installed. Package "python3-packaging-25.0-5.fc43.noarch" is already installed. Package "python3-pillow-11.3.0-4.fc43.x86_64" is already installed. Package "python3-pip-25.2-2.fc43.noarch" is already installed. Package "python3-jwt-2.8.0-6.fc43.noarch" is already installed. Package "python3-jwt+crypto-2.8.0-6.fc43.noarch" is already installed. Package "python3-pytest-8.3.5-8.fc43.noarch" is already installed. Package "python3-pytest-asyncio-1.1.0-1.fc43.noarch" is already installed. Package "python3-pytest-django-4.9.0-4.fc43.noarch" is already installed. Package "python3-openid-3.1.0-28.fc43.noarch" is already installed. Package "python3-qrcode-8.0-8.fc43.noarch" is already installed. Package "python3-requests-2.32.5-1.fc43.noarch" is already installed. Package "python3-requests-oauthlib-1.3.1-14.fc43.noarch" is already installed. Package "python3-setuptools-78.1.1-12.fc43.noarch" is already installed. Package "tox-4.26.0-5.fc43.noarch" is already installed. Package "python3-tox-current-env-0.0.16-6.fc43.noarch" is already installed. Building target platforms: x86_64 Building for target x86_64 setting SOURCE_DATE_EPOCH=1755216000 Executing(%generate_buildrequires): /bin/sh -e /var/tmp/rpm-tmp.quZf6f + umask 022 + cd /builddir/build/BUILD/python-django-allauth-65.3.0-build + cd django-allauth + echo pyproject-rpm-macros + echo python3-devel + echo 'python3dist(packaging)' + echo 'python3dist(pip) >= 19' + '[' -f pyproject.toml ']' + echo '(python3dist(tomli) if python3-devel < 3.11)' + rm -rfv '*.dist-info/' + '[' -f /usr/bin/python3 ']' + mkdir -p /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir + echo -n + CFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + CXXFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + FFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + FCFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + VALAFLAGS=-g + RUSTFLAGS='-Copt-level=3 -Cdebuginfo=2 -Ccodegen-units=1 -Cstrip=none -Cforce-frame-pointers=yes --cap-lints=warn' + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,pack-relative-relocs -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-hardened-ld-errors -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,--build-id=sha1 ' + LT_SYS_LIBRARY_PATH=/usr/lib64: + CC=gcc + CXX=g++ + TMPDIR=/builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir + RPM_TOXENV=py314 + FEDORA=43 + HOSTNAME=rpmbuild + /usr/bin/python3 -Bs /usr/lib/rpm/redhat/pyproject_buildrequires.py --generate-extras --python3_pkgversion 3 --wheeldir /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/pyproject-wheeldir --output /builddir/build/BUILD/python-django-allauth-65.3.0-build/python-django-allauth-65.3.0-5.fc43.x86_64-pyproject-buildrequires -t -x mfa,openid,saml,socialaccount,steam Handling setuptools>=40.8.0 from build-system.requires Requirement satisfied: setuptools>=40.8.0 (installed: setuptools 78.1.1) /usr/lib/python3.14/site-packages/setuptools/dist.py:759: SetuptoolsDeprecationWarning: License classifiers are deprecated. !! ******************************************************************************** Please consider removing the following classifiers in favor of a SPDX license expression: License :: OSI Approved :: MIT License See https://packaging.python.org/en/latest/guides/writing-pyproject-toml/#license for details. ******************************************************************************** !! self._finalize_license_expression() running egg_info writing django_allauth.egg-info/PKG-INFO writing dependency_links to django_allauth.egg-info/dependency_links.txt writing requirements to django_allauth.egg-info/requires.txt writing top-level names to django_allauth.egg-info/top_level.txt reading manifest file 'django_allauth.egg-info/SOURCES.txt' reading manifest template 'MANIFEST.in' warning: no files found matching '*.mo' under directory 'allauth' adding license file 'LICENSE' adding license file 'AUTHORS' writing manifest file 'django_allauth.egg-info/SOURCES.txt' Handling tox-current-env >= 0.0.16 from tox itself Requirement satisfied: tox-current-env >= 0.0.16 (installed: tox-current-env 0.0.16) py314: OK (0.00 seconds) congratulations :) (0.07 seconds) Handling tox from tox --print-deps-only: py314 Requirement satisfied: tox (installed: tox 4.26.0) Handling coverage from tox --print-deps-only: py314 Requirement satisfied: coverage (installed: coverage 7.10.2) Handling Pillow>=9.0 from tox --print-deps-only: py314 Requirement satisfied: Pillow>=9.0 (installed: Pillow 11.3.0) Handling pytest>=7.4 from tox --print-deps-only: py314 Requirement satisfied: pytest>=7.4 (installed: pytest 8.3.5) Handling pytest-asyncio >= 0.23.6 from tox --print-deps-only: py314 Requirement satisfied: pytest-asyncio >= 0.23.6 (installed: pytest-asyncio 1.1.0) Handling pytest-django>=4.5.2 from tox --print-deps-only: py314 Requirement satisfied: pytest-django>=4.5.2 (installed: pytest-django 4.9.0) Handling python3-saml>=1.15.0,<2.0.0 from tox --print-deps-only: py314 Requirement satisfied: python3-saml>=1.15.0,<2.0.0 (installed: python3-saml 1.16.0) py314: OK (0.00 seconds) congratulations :) (0.07 seconds) running dist_info writing django_allauth.egg-info/PKG-INFO writing dependency_links to django_allauth.egg-info/dependency_links.txt writing requirements to django_allauth.egg-info/requires.txt writing top-level names to django_allauth.egg-info/top_level.txt reading manifest file 'django_allauth.egg-info/SOURCES.txt' reading manifest template 'MANIFEST.in' warning: no files found matching '*.mo' under directory 'allauth' adding license file 'LICENSE' adding license file 'AUTHORS' writing manifest file 'django_allauth.egg-info/SOURCES.txt' creating '/builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/django_allauth-65.3.0.dist-info' Handling Django>=4.2.16 from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: Django>=4.2.16 (installed: Django 5.2.4) Handling asgiref>=3.8.1 from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: asgiref>=3.8.1 (installed: asgiref 3.8.1) Handling qrcode>=7.0.0; extra == "mfa" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: qrcode>=7.0.0; extra == "mfa" (installed: qrcode 8.0) Handling fido2>=1.1.2; extra == "mfa" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: fido2>=1.1.2; extra == "mfa" (installed: fido2 2.0.0) Handling python3-openid>=3.0.8; extra == "openid" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: python3-openid>=3.0.8; extra == "openid" (installed: python3-openid 3.1.0) Handling python3-saml<2.0.0,>=1.15.0; extra == "saml" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: python3-saml<2.0.0,>=1.15.0; extra == "saml" (installed: python3-saml 1.16.0) Handling python3-openid>=3.0.8; extra == "steam" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: python3-openid>=3.0.8; extra == "steam" (installed: python3-openid 3.1.0) Handling requests-oauthlib>=0.3.0; extra == "socialaccount" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: requests-oauthlib>=0.3.0; extra == "socialaccount" (installed: requests-oauthlib 1.3.1) Handling requests>=2.0.0; extra == "socialaccount" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: requests>=2.0.0; extra == "socialaccount" (installed: requests 2.32.5) Handling pyjwt[crypto]>=1.7; extra == "socialaccount" from hook generated metadata: Requires-Dist (django-allauth) Requirement satisfied: pyjwt[crypto]>=1.7; extra == "socialaccount" (installed: pyjwt 2.8.0) (extras are currently not checked) + cat /builddir/build/BUILD/python-django-allauth-65.3.0-build/python-django-allauth-65.3.0-5.fc43.x86_64-pyproject-buildrequires + rm -rfv django_allauth-65.3.0.dist-info/ removed 'django_allauth-65.3.0.dist-info/licenses/AUTHORS' removed 'django_allauth-65.3.0.dist-info/licenses/LICENSE' removed directory 'django_allauth-65.3.0.dist-info/licenses' removed 'django_allauth-65.3.0.dist-info/METADATA' removed 'django_allauth-65.3.0.dist-info/top_level.txt' removed directory 'django_allauth-65.3.0.dist-info/' + RPM_EC=0 ++ jobs -p + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.n9MNwU + umask 022 + cd /builddir/build/BUILD/python-django-allauth-65.3.0-build + CFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + export CFLAGS + CXXFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + export CXXFLAGS + FFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + export FFLAGS + FCFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + export FCFLAGS + VALAFLAGS=-g + export VALAFLAGS + RUSTFLAGS='-Copt-level=3 -Cdebuginfo=2 -Ccodegen-units=1 -Cstrip=none -Cforce-frame-pointers=yes -Clink-arg=-specs=/usr/lib/rpm/redhat/redhat-package-notes --cap-lints=warn' + export RUSTFLAGS + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,pack-relative-relocs -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-hardened-ld-errors -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,--build-id=sha1 -specs=/usr/lib/rpm/redhat/redhat-package-notes ' + export LDFLAGS + LT_SYS_LIBRARY_PATH=/usr/lib64: + export LT_SYS_LIBRARY_PATH + CC=gcc + export CC + CXX=g++ + export CXX + cd django-allauth + mkdir -p /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir + CFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + CXXFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + FFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + FCFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + VALAFLAGS=-g + RUSTFLAGS='-Copt-level=3 -Cdebuginfo=2 -Ccodegen-units=1 -Cstrip=none -Cforce-frame-pointers=yes -Clink-arg=-specs=/usr/lib/rpm/redhat/redhat-package-notes --cap-lints=warn' + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,pack-relative-relocs -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-hardened-ld-errors -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,--build-id=sha1 -specs=/usr/lib/rpm/redhat/redhat-package-notes ' + LT_SYS_LIBRARY_PATH=/usr/lib64: + CC=gcc + CXX=g++ + TMPDIR=/builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir + /usr/bin/python3 -Bs /usr/lib/rpm/redhat/pyproject_wheel.py /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/pyproject-wheeldir Processing /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth Preparing metadata (pyproject.toml): started Running command Preparing metadata (pyproject.toml) /usr/lib/python3.14/site-packages/setuptools/dist.py:759: SetuptoolsDeprecationWarning: License classifiers are deprecated. !! ******************************************************************************** Please consider removing the following classifiers in favor of a SPDX license expression: License :: OSI Approved :: MIT License See https://packaging.python.org/en/latest/guides/writing-pyproject-toml/#license for details. ******************************************************************************** !! self._finalize_license_expression() running dist_info creating /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir/pip-modern-metadata-wzrk1s_c/django_allauth.egg-info writing /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir/pip-modern-metadata-wzrk1s_c/django_allauth.egg-info/PKG-INFO writing dependency_links to /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir/pip-modern-metadata-wzrk1s_c/django_allauth.egg-info/dependency_links.txt writing requirements to /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir/pip-modern-metadata-wzrk1s_c/django_allauth.egg-info/requires.txt writing top-level names to /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir/pip-modern-metadata-wzrk1s_c/django_allauth.egg-info/top_level.txt writing manifest file '/builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir/pip-modern-metadata-wzrk1s_c/django_allauth.egg-info/SOURCES.txt' reading manifest file '/builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir/pip-modern-metadata-wzrk1s_c/django_allauth.egg-info/SOURCES.txt' reading manifest template 'MANIFEST.in' warning: no files found matching '*.mo' under directory 'allauth' adding license file 'LICENSE' adding license file 'AUTHORS' writing manifest file '/builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir/pip-modern-metadata-wzrk1s_c/django_allauth.egg-info/SOURCES.txt' creating '/builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir/pip-modern-metadata-wzrk1s_c/django_allauth-65.3.0.dist-info' Preparing metadata (pyproject.toml): finished with status 'done' Building wheels for collected packages: django-allauth Building wheel for django-allauth (pyproject.toml): started Running command Building wheel for django-allauth (pyproject.toml) /usr/lib/python3.14/site-packages/setuptools/dist.py:759: SetuptoolsDeprecationWarning: License classifiers are deprecated. !! ******************************************************************************** Please consider removing the following classifiers in favor of a SPDX license expression: License :: OSI Approved :: MIT License See https://packaging.python.org/en/latest/guides/writing-pyproject-toml/#license for details. ******************************************************************************** !! self._finalize_license_expression() running bdist_wheel running build running build_py creating build/lib/allauth copying allauth/utils.py -> build/lib/allauth copying allauth/urls.py -> build/lib/allauth copying allauth/tests.py -> build/lib/allauth copying allauth/ratelimit.py -> build/lib/allauth copying allauth/models.py -> build/lib/allauth copying allauth/exceptions.py -> build/lib/allauth copying allauth/decorators.py -> build/lib/allauth copying allauth/conftest.py -> build/lib/allauth copying allauth/app_settings.py -> build/lib/allauth copying allauth/__init__.py -> build/lib/allauth creating build/lib/allauth/usersessions copying allauth/usersessions/views.py -> build/lib/allauth/usersessions copying allauth/usersessions/urls.py -> build/lib/allauth/usersessions copying allauth/usersessions/signals.py -> build/lib/allauth/usersessions copying allauth/usersessions/models.py -> build/lib/allauth/usersessions copying allauth/usersessions/middleware.py -> build/lib/allauth/usersessions copying allauth/usersessions/forms.py -> build/lib/allauth/usersessions copying allauth/usersessions/apps.py -> build/lib/allauth/usersessions copying allauth/usersessions/app_settings.py -> build/lib/allauth/usersessions copying allauth/usersessions/admin.py -> build/lib/allauth/usersessions copying allauth/usersessions/adapter.py -> build/lib/allauth/usersessions copying allauth/usersessions/__init__.py -> build/lib/allauth/usersessions creating build/lib/allauth/templatetags copying allauth/templatetags/allauth.py -> build/lib/allauth/templatetags copying allauth/templatetags/__init__.py -> build/lib/allauth/templatetags creating build/lib/allauth/socialaccount copying allauth/socialaccount/views.py -> build/lib/allauth/socialaccount copying allauth/socialaccount/urls.py -> build/lib/allauth/socialaccount copying allauth/socialaccount/signals.py -> build/lib/allauth/socialaccount copying allauth/socialaccount/sessions.py -> build/lib/allauth/socialaccount copying allauth/socialaccount/models.py -> build/lib/allauth/socialaccount copying allauth/socialaccount/helpers.py -> build/lib/allauth/socialaccount copying allauth/socialaccount/forms.py -> build/lib/allauth/socialaccount copying allauth/socialaccount/conftest.py -> build/lib/allauth/socialaccount copying allauth/socialaccount/apps.py -> build/lib/allauth/socialaccount copying allauth/socialaccount/app_settings.py -> build/lib/allauth/socialaccount copying allauth/socialaccount/admin.py -> build/lib/allauth/socialaccount copying allauth/socialaccount/adapter.py -> build/lib/allauth/socialaccount copying allauth/socialaccount/__init__.py -> build/lib/allauth/socialaccount creating build/lib/allauth/mfa copying allauth/mfa/utils.py -> build/lib/allauth/mfa copying allauth/mfa/urls.py -> build/lib/allauth/mfa copying allauth/mfa/stages.py -> build/lib/allauth/mfa copying allauth/mfa/signals.py -> build/lib/allauth/mfa copying allauth/mfa/models.py -> build/lib/allauth/mfa copying allauth/mfa/checks.py -> build/lib/allauth/mfa copying allauth/mfa/apps.py -> build/lib/allauth/mfa copying allauth/mfa/app_settings.py -> build/lib/allauth/mfa copying allauth/mfa/admin.py -> build/lib/allauth/mfa copying allauth/mfa/adapter.py -> build/lib/allauth/mfa copying allauth/mfa/__init__.py -> build/lib/allauth/mfa creating build/lib/allauth/headless copying allauth/headless/urls.py -> build/lib/allauth/headless copying allauth/headless/constants.py -> build/lib/allauth/headless copying allauth/headless/conftest.py -> build/lib/allauth/headless copying allauth/headless/apps.py -> build/lib/allauth/headless copying allauth/headless/app_settings.py -> build/lib/allauth/headless copying allauth/headless/adapter.py -> build/lib/allauth/headless copying allauth/headless/__init__.py -> build/lib/allauth/headless creating build/lib/allauth/core copying allauth/core/ratelimit.py -> build/lib/allauth/core copying allauth/core/exceptions.py -> build/lib/allauth/core copying allauth/core/context.py -> build/lib/allauth/core copying allauth/core/__init__.py -> build/lib/allauth/core creating build/lib/allauth/account copying allauth/account/views.py -> build/lib/allauth/account copying allauth/account/utils.py -> build/lib/allauth/account copying allauth/account/urls.py -> build/lib/allauth/account copying allauth/account/stages.py -> build/lib/allauth/account copying allauth/account/signals.py -> build/lib/allauth/account copying allauth/account/reauthentication.py -> build/lib/allauth/account copying allauth/account/models.py -> build/lib/allauth/account copying allauth/account/mixins.py -> build/lib/allauth/account copying allauth/account/middleware.py -> build/lib/allauth/account copying allauth/account/managers.py -> build/lib/allauth/account copying allauth/account/forms.py -> build/lib/allauth/account copying allauth/account/decorators.py -> build/lib/allauth/account copying allauth/account/checks.py -> build/lib/allauth/account copying allauth/account/authentication.py -> build/lib/allauth/account copying allauth/account/auth_backends.py -> build/lib/allauth/account copying allauth/account/apps.py -> build/lib/allauth/account copying allauth/account/app_settings.py -> build/lib/allauth/account copying allauth/account/admin.py -> build/lib/allauth/account copying allauth/account/adapter.py -> build/lib/allauth/account copying allauth/account/__init__.py -> build/lib/allauth/account creating build/lib/allauth/usersessions/tests copying allauth/usersessions/tests/test_views.py -> build/lib/allauth/usersessions/tests copying allauth/usersessions/tests/test_middleware.py -> build/lib/allauth/usersessions/tests copying allauth/usersessions/tests/__init__.py -> build/lib/allauth/usersessions/tests creating build/lib/allauth/usersessions/migrations copying allauth/usersessions/migrations/__init__.py -> build/lib/allauth/usersessions/migrations copying allauth/usersessions/migrations/0001_initial.py -> build/lib/allauth/usersessions/migrations creating build/lib/allauth/usersessions/internal copying allauth/usersessions/internal/__init__.py -> build/lib/allauth/usersessions/internal creating build/lib/allauth/usersessions/internal/flows copying allauth/usersessions/internal/flows/sessions.py -> build/lib/allauth/usersessions/internal/flows copying allauth/usersessions/internal/flows/__init__.py -> build/lib/allauth/usersessions/internal/flows creating build/lib/allauth/socialaccount/tests copying allauth/socialaccount/tests/test_utils.py -> build/lib/allauth/socialaccount/tests copying allauth/socialaccount/tests/test_signup.py -> build/lib/allauth/socialaccount/tests copying allauth/socialaccount/tests/test_registry.py -> build/lib/allauth/socialaccount/tests copying allauth/socialaccount/tests/test_login.py -> build/lib/allauth/socialaccount/tests copying allauth/socialaccount/tests/test_connect.py -> build/lib/allauth/socialaccount/tests copying allauth/socialaccount/tests/test_adapter.py -> build/lib/allauth/socialaccount/tests copying allauth/socialaccount/tests/conftest.py -> build/lib/allauth/socialaccount/tests copying allauth/socialaccount/tests/__init__.py -> build/lib/allauth/socialaccount/tests creating build/lib/allauth/socialaccount/templatetags copying allauth/socialaccount/templatetags/socialaccount.py -> build/lib/allauth/socialaccount/templatetags copying allauth/socialaccount/templatetags/__init__.py -> build/lib/allauth/socialaccount/templatetags creating build/lib/allauth/socialaccount/providers copying allauth/socialaccount/providers/__init__.py -> build/lib/allauth/socialaccount/providers creating build/lib/allauth/socialaccount/migrations copying allauth/socialaccount/migrations/__init__.py -> build/lib/allauth/socialaccount/migrations copying allauth/socialaccount/migrations/0006_alter_socialaccount_extra_data.py -> build/lib/allauth/socialaccount/migrations copying allauth/socialaccount/migrations/0005_socialtoken_nullable_app.py -> build/lib/allauth/socialaccount/migrations copying allauth/socialaccount/migrations/0004_app_provider_id_settings.py -> build/lib/allauth/socialaccount/migrations copying allauth/socialaccount/migrations/0003_extra_data_default_dict.py -> build/lib/allauth/socialaccount/migrations copying allauth/socialaccount/migrations/0002_token_max_lengths.py -> build/lib/allauth/socialaccount/migrations copying allauth/socialaccount/migrations/0001_initial.py -> build/lib/allauth/socialaccount/migrations creating build/lib/allauth/socialaccount/internal copying allauth/socialaccount/internal/statekit.py -> build/lib/allauth/socialaccount/internal copying allauth/socialaccount/internal/jwtkit.py -> build/lib/allauth/socialaccount/internal copying allauth/socialaccount/internal/__init__.py -> build/lib/allauth/socialaccount/internal creating build/lib/allauth/socialaccount/providers/zoom copying allauth/socialaccount/providers/zoom/views.py -> build/lib/allauth/socialaccount/providers/zoom copying allauth/socialaccount/providers/zoom/urls.py -> build/lib/allauth/socialaccount/providers/zoom copying allauth/socialaccount/providers/zoom/tests.py -> build/lib/allauth/socialaccount/providers/zoom copying allauth/socialaccount/providers/zoom/provider.py -> build/lib/allauth/socialaccount/providers/zoom copying allauth/socialaccount/providers/zoom/__init__.py -> build/lib/allauth/socialaccount/providers/zoom creating build/lib/allauth/socialaccount/providers/zoho copying allauth/socialaccount/providers/zoho/views.py -> build/lib/allauth/socialaccount/providers/zoho copying allauth/socialaccount/providers/zoho/urls.py -> build/lib/allauth/socialaccount/providers/zoho copying allauth/socialaccount/providers/zoho/tests.py -> build/lib/allauth/socialaccount/providers/zoho copying allauth/socialaccount/providers/zoho/provider.py -> build/lib/allauth/socialaccount/providers/zoho copying allauth/socialaccount/providers/zoho/__init__.py -> build/lib/allauth/socialaccount/providers/zoho creating build/lib/allauth/socialaccount/providers/ynab copying allauth/socialaccount/providers/ynab/views.py -> build/lib/allauth/socialaccount/providers/ynab copying allauth/socialaccount/providers/ynab/urls.py -> build/lib/allauth/socialaccount/providers/ynab copying allauth/socialaccount/providers/ynab/tests.py -> build/lib/allauth/socialaccount/providers/ynab copying allauth/socialaccount/providers/ynab/provider.py -> build/lib/allauth/socialaccount/providers/ynab copying allauth/socialaccount/providers/ynab/__init__.py -> build/lib/allauth/socialaccount/providers/ynab creating build/lib/allauth/socialaccount/providers/yandex copying allauth/socialaccount/providers/yandex/views.py -> build/lib/allauth/socialaccount/providers/yandex copying allauth/socialaccount/providers/yandex/urls.py -> build/lib/allauth/socialaccount/providers/yandex copying allauth/socialaccount/providers/yandex/tests.py -> build/lib/allauth/socialaccount/providers/yandex copying allauth/socialaccount/providers/yandex/provider.py -> build/lib/allauth/socialaccount/providers/yandex copying allauth/socialaccount/providers/yandex/__init__.py -> build/lib/allauth/socialaccount/providers/yandex creating build/lib/allauth/socialaccount/providers/yahoo copying allauth/socialaccount/providers/yahoo/views.py -> build/lib/allauth/socialaccount/providers/yahoo copying allauth/socialaccount/providers/yahoo/urls.py -> build/lib/allauth/socialaccount/providers/yahoo copying allauth/socialaccount/providers/yahoo/tests.py -> build/lib/allauth/socialaccount/providers/yahoo copying allauth/socialaccount/providers/yahoo/provider.py -> build/lib/allauth/socialaccount/providers/yahoo copying allauth/socialaccount/providers/yahoo/models.py -> build/lib/allauth/socialaccount/providers/yahoo copying allauth/socialaccount/providers/yahoo/__init__.py -> build/lib/allauth/socialaccount/providers/yahoo creating build/lib/allauth/socialaccount/providers/xing copying allauth/socialaccount/providers/xing/views.py -> build/lib/allauth/socialaccount/providers/xing copying allauth/socialaccount/providers/xing/urls.py -> build/lib/allauth/socialaccount/providers/xing copying allauth/socialaccount/providers/xing/tests.py -> build/lib/allauth/socialaccount/providers/xing copying allauth/socialaccount/providers/xing/provider.py -> build/lib/allauth/socialaccount/providers/xing copying allauth/socialaccount/providers/xing/__init__.py -> build/lib/allauth/socialaccount/providers/xing creating build/lib/allauth/socialaccount/providers/windowslive copying allauth/socialaccount/providers/windowslive/views.py -> build/lib/allauth/socialaccount/providers/windowslive copying allauth/socialaccount/providers/windowslive/urls.py -> build/lib/allauth/socialaccount/providers/windowslive copying allauth/socialaccount/providers/windowslive/tests.py -> build/lib/allauth/socialaccount/providers/windowslive copying allauth/socialaccount/providers/windowslive/provider.py -> build/lib/allauth/socialaccount/providers/windowslive copying allauth/socialaccount/providers/windowslive/__init__.py -> build/lib/allauth/socialaccount/providers/windowslive creating build/lib/allauth/socialaccount/providers/weixin copying allauth/socialaccount/providers/weixin/views.py -> build/lib/allauth/socialaccount/providers/weixin copying allauth/socialaccount/providers/weixin/urls.py -> build/lib/allauth/socialaccount/providers/weixin copying allauth/socialaccount/providers/weixin/tests.py -> build/lib/allauth/socialaccount/providers/weixin copying allauth/socialaccount/providers/weixin/provider.py -> build/lib/allauth/socialaccount/providers/weixin copying allauth/socialaccount/providers/weixin/client.py -> build/lib/allauth/socialaccount/providers/weixin copying allauth/socialaccount/providers/weixin/__init__.py -> build/lib/allauth/socialaccount/providers/weixin creating build/lib/allauth/socialaccount/providers/weibo copying allauth/socialaccount/providers/weibo/views.py -> build/lib/allauth/socialaccount/providers/weibo copying allauth/socialaccount/providers/weibo/urls.py -> build/lib/allauth/socialaccount/providers/weibo copying allauth/socialaccount/providers/weibo/tests.py -> build/lib/allauth/socialaccount/providers/weibo copying allauth/socialaccount/providers/weibo/provider.py -> build/lib/allauth/socialaccount/providers/weibo copying allauth/socialaccount/providers/weibo/__init__.py -> build/lib/allauth/socialaccount/providers/weibo creating build/lib/allauth/socialaccount/providers/wahoo copying allauth/socialaccount/providers/wahoo/views.py -> build/lib/allauth/socialaccount/providers/wahoo copying allauth/socialaccount/providers/wahoo/urls.py -> build/lib/allauth/socialaccount/providers/wahoo copying allauth/socialaccount/providers/wahoo/tests.py -> build/lib/allauth/socialaccount/providers/wahoo copying allauth/socialaccount/providers/wahoo/provider.py -> build/lib/allauth/socialaccount/providers/wahoo copying allauth/socialaccount/providers/wahoo/__init__.py -> build/lib/allauth/socialaccount/providers/wahoo creating build/lib/allauth/socialaccount/providers/vk copying allauth/socialaccount/providers/vk/views.py -> build/lib/allauth/socialaccount/providers/vk copying allauth/socialaccount/providers/vk/urls.py -> build/lib/allauth/socialaccount/providers/vk copying allauth/socialaccount/providers/vk/tests.py -> build/lib/allauth/socialaccount/providers/vk copying allauth/socialaccount/providers/vk/provider.py -> build/lib/allauth/socialaccount/providers/vk copying allauth/socialaccount/providers/vk/__init__.py -> build/lib/allauth/socialaccount/providers/vk creating build/lib/allauth/socialaccount/providers/vimeo_oauth2 copying allauth/socialaccount/providers/vimeo_oauth2/views.py -> build/lib/allauth/socialaccount/providers/vimeo_oauth2 copying allauth/socialaccount/providers/vimeo_oauth2/urls.py -> build/lib/allauth/socialaccount/providers/vimeo_oauth2 copying allauth/socialaccount/providers/vimeo_oauth2/tests.py -> build/lib/allauth/socialaccount/providers/vimeo_oauth2 copying allauth/socialaccount/providers/vimeo_oauth2/provider.py -> build/lib/allauth/socialaccount/providers/vimeo_oauth2 copying allauth/socialaccount/providers/vimeo_oauth2/models.py -> build/lib/allauth/socialaccount/providers/vimeo_oauth2 copying allauth/socialaccount/providers/vimeo_oauth2/__init__.py -> build/lib/allauth/socialaccount/providers/vimeo_oauth2 creating build/lib/allauth/socialaccount/providers/vimeo copying allauth/socialaccount/providers/vimeo/views.py -> build/lib/allauth/socialaccount/providers/vimeo copying allauth/socialaccount/providers/vimeo/urls.py -> build/lib/allauth/socialaccount/providers/vimeo copying allauth/socialaccount/providers/vimeo/tests.py -> build/lib/allauth/socialaccount/providers/vimeo copying allauth/socialaccount/providers/vimeo/provider.py -> build/lib/allauth/socialaccount/providers/vimeo copying allauth/socialaccount/providers/vimeo/__init__.py -> build/lib/allauth/socialaccount/providers/vimeo creating build/lib/allauth/socialaccount/providers/untappd copying allauth/socialaccount/providers/untappd/views.py -> build/lib/allauth/socialaccount/providers/untappd copying allauth/socialaccount/providers/untappd/urls.py -> build/lib/allauth/socialaccount/providers/untappd copying allauth/socialaccount/providers/untappd/tests.py -> build/lib/allauth/socialaccount/providers/untappd copying allauth/socialaccount/providers/untappd/provider.py -> build/lib/allauth/socialaccount/providers/untappd copying allauth/socialaccount/providers/untappd/client.py -> build/lib/allauth/socialaccount/providers/untappd copying allauth/socialaccount/providers/untappd/__init__.py -> build/lib/allauth/socialaccount/providers/untappd creating build/lib/allauth/socialaccount/providers/twitter_oauth2 copying allauth/socialaccount/providers/twitter_oauth2/views.py -> build/lib/allauth/socialaccount/providers/twitter_oauth2 copying allauth/socialaccount/providers/twitter_oauth2/urls.py -> build/lib/allauth/socialaccount/providers/twitter_oauth2 copying allauth/socialaccount/providers/twitter_oauth2/tests.py -> build/lib/allauth/socialaccount/providers/twitter_oauth2 copying allauth/socialaccount/providers/twitter_oauth2/provider.py -> build/lib/allauth/socialaccount/providers/twitter_oauth2 copying allauth/socialaccount/providers/twitter_oauth2/__init__.py -> build/lib/allauth/socialaccount/providers/twitter_oauth2 creating build/lib/allauth/socialaccount/providers/twitter copying allauth/socialaccount/providers/twitter/views.py -> build/lib/allauth/socialaccount/providers/twitter copying allauth/socialaccount/providers/twitter/urls.py -> build/lib/allauth/socialaccount/providers/twitter copying allauth/socialaccount/providers/twitter/tests.py -> build/lib/allauth/socialaccount/providers/twitter copying allauth/socialaccount/providers/twitter/provider.py -> build/lib/allauth/socialaccount/providers/twitter copying allauth/socialaccount/providers/twitter/__init__.py -> build/lib/allauth/socialaccount/providers/twitter creating build/lib/allauth/socialaccount/providers/twitch copying allauth/socialaccount/providers/twitch/views.py -> build/lib/allauth/socialaccount/providers/twitch copying allauth/socialaccount/providers/twitch/urls.py -> build/lib/allauth/socialaccount/providers/twitch copying allauth/socialaccount/providers/twitch/tests.py -> build/lib/allauth/socialaccount/providers/twitch copying allauth/socialaccount/providers/twitch/provider.py -> build/lib/allauth/socialaccount/providers/twitch copying allauth/socialaccount/providers/twitch/__init__.py -> build/lib/allauth/socialaccount/providers/twitch creating build/lib/allauth/socialaccount/providers/twentythreeandme copying allauth/socialaccount/providers/twentythreeandme/views.py -> build/lib/allauth/socialaccount/providers/twentythreeandme copying allauth/socialaccount/providers/twentythreeandme/urls.py -> build/lib/allauth/socialaccount/providers/twentythreeandme copying allauth/socialaccount/providers/twentythreeandme/tests.py -> build/lib/allauth/socialaccount/providers/twentythreeandme copying allauth/socialaccount/providers/twentythreeandme/provider.py -> build/lib/allauth/socialaccount/providers/twentythreeandme copying allauth/socialaccount/providers/twentythreeandme/__init__.py -> build/lib/allauth/socialaccount/providers/twentythreeandme creating build/lib/allauth/socialaccount/providers/tumblr copying allauth/socialaccount/providers/tumblr/views.py -> build/lib/allauth/socialaccount/providers/tumblr copying allauth/socialaccount/providers/tumblr/urls.py -> build/lib/allauth/socialaccount/providers/tumblr copying allauth/socialaccount/providers/tumblr/tests.py -> build/lib/allauth/socialaccount/providers/tumblr copying allauth/socialaccount/providers/tumblr/provider.py -> build/lib/allauth/socialaccount/providers/tumblr copying allauth/socialaccount/providers/tumblr/__init__.py -> build/lib/allauth/socialaccount/providers/tumblr creating build/lib/allauth/socialaccount/providers/trello copying allauth/socialaccount/providers/trello/views.py -> build/lib/allauth/socialaccount/providers/trello copying allauth/socialaccount/providers/trello/urls.py -> build/lib/allauth/socialaccount/providers/trello copying allauth/socialaccount/providers/trello/tests.py -> build/lib/allauth/socialaccount/providers/trello copying allauth/socialaccount/providers/trello/provider.py -> build/lib/allauth/socialaccount/providers/trello copying allauth/socialaccount/providers/trello/__init__.py -> build/lib/allauth/socialaccount/providers/trello creating build/lib/allauth/socialaccount/providers/trainingpeaks copying allauth/socialaccount/providers/trainingpeaks/views.py -> build/lib/allauth/socialaccount/providers/trainingpeaks copying allauth/socialaccount/providers/trainingpeaks/urls.py -> build/lib/allauth/socialaccount/providers/trainingpeaks copying allauth/socialaccount/providers/trainingpeaks/tests.py -> build/lib/allauth/socialaccount/providers/trainingpeaks copying allauth/socialaccount/providers/trainingpeaks/provider.py -> build/lib/allauth/socialaccount/providers/trainingpeaks copying allauth/socialaccount/providers/trainingpeaks/__init__.py -> build/lib/allauth/socialaccount/providers/trainingpeaks creating build/lib/allauth/socialaccount/providers/tiktok copying allauth/socialaccount/providers/tiktok/views.py -> build/lib/allauth/socialaccount/providers/tiktok copying allauth/socialaccount/providers/tiktok/urls.py -> build/lib/allauth/socialaccount/providers/tiktok copying allauth/socialaccount/providers/tiktok/tests.py -> build/lib/allauth/socialaccount/providers/tiktok copying allauth/socialaccount/providers/tiktok/scope.py -> build/lib/allauth/socialaccount/providers/tiktok copying allauth/socialaccount/providers/tiktok/provider.py -> build/lib/allauth/socialaccount/providers/tiktok copying allauth/socialaccount/providers/tiktok/client.py -> build/lib/allauth/socialaccount/providers/tiktok copying allauth/socialaccount/providers/tiktok/__init__.py -> build/lib/allauth/socialaccount/providers/tiktok creating build/lib/allauth/socialaccount/providers/telegram copying allauth/socialaccount/providers/telegram/views.py -> build/lib/allauth/socialaccount/providers/telegram copying allauth/socialaccount/providers/telegram/urls.py -> build/lib/allauth/socialaccount/providers/telegram copying allauth/socialaccount/providers/telegram/tests.py -> build/lib/allauth/socialaccount/providers/telegram copying allauth/socialaccount/providers/telegram/provider.py -> build/lib/allauth/socialaccount/providers/telegram copying allauth/socialaccount/providers/telegram/__init__.py -> build/lib/allauth/socialaccount/providers/telegram creating build/lib/allauth/socialaccount/providers/stripe copying allauth/socialaccount/providers/stripe/views.py -> build/lib/allauth/socialaccount/providers/stripe copying allauth/socialaccount/providers/stripe/urls.py -> build/lib/allauth/socialaccount/providers/stripe copying allauth/socialaccount/providers/stripe/tests.py -> build/lib/allauth/socialaccount/providers/stripe copying allauth/socialaccount/providers/stripe/provider.py -> build/lib/allauth/socialaccount/providers/stripe copying allauth/socialaccount/providers/stripe/__init__.py -> build/lib/allauth/socialaccount/providers/stripe creating build/lib/allauth/socialaccount/providers/strava copying allauth/socialaccount/providers/strava/views.py -> build/lib/allauth/socialaccount/providers/strava copying allauth/socialaccount/providers/strava/urls.py -> build/lib/allauth/socialaccount/providers/strava copying allauth/socialaccount/providers/strava/tests.py -> build/lib/allauth/socialaccount/providers/strava copying allauth/socialaccount/providers/strava/provider.py -> build/lib/allauth/socialaccount/providers/strava copying allauth/socialaccount/providers/strava/__init__.py -> build/lib/allauth/socialaccount/providers/strava creating build/lib/allauth/socialaccount/providers/stocktwits copying allauth/socialaccount/providers/stocktwits/views.py -> build/lib/allauth/socialaccount/providers/stocktwits copying allauth/socialaccount/providers/stocktwits/urls.py -> build/lib/allauth/socialaccount/providers/stocktwits copying allauth/socialaccount/providers/stocktwits/tests.py -> build/lib/allauth/socialaccount/providers/stocktwits copying allauth/socialaccount/providers/stocktwits/provider.py -> build/lib/allauth/socialaccount/providers/stocktwits copying allauth/socialaccount/providers/stocktwits/__init__.py -> build/lib/allauth/socialaccount/providers/stocktwits creating build/lib/allauth/socialaccount/providers/steam copying allauth/socialaccount/providers/steam/views.py -> build/lib/allauth/socialaccount/providers/steam copying allauth/socialaccount/providers/steam/urls.py -> build/lib/allauth/socialaccount/providers/steam copying allauth/socialaccount/providers/steam/provider.py -> build/lib/allauth/socialaccount/providers/steam copying allauth/socialaccount/providers/steam/models.py -> build/lib/allauth/socialaccount/providers/steam copying allauth/socialaccount/providers/steam/__init__.py -> build/lib/allauth/socialaccount/providers/steam creating build/lib/allauth/socialaccount/providers/stackexchange copying allauth/socialaccount/providers/stackexchange/views.py -> build/lib/allauth/socialaccount/providers/stackexchange copying allauth/socialaccount/providers/stackexchange/urls.py -> build/lib/allauth/socialaccount/providers/stackexchange copying allauth/socialaccount/providers/stackexchange/tests.py -> build/lib/allauth/socialaccount/providers/stackexchange copying allauth/socialaccount/providers/stackexchange/provider.py -> build/lib/allauth/socialaccount/providers/stackexchange copying allauth/socialaccount/providers/stackexchange/__init__.py -> build/lib/allauth/socialaccount/providers/stackexchange creating build/lib/allauth/socialaccount/providers/spotify copying allauth/socialaccount/providers/spotify/views.py -> build/lib/allauth/socialaccount/providers/spotify copying allauth/socialaccount/providers/spotify/urls.py -> build/lib/allauth/socialaccount/providers/spotify copying allauth/socialaccount/providers/spotify/tests.py -> build/lib/allauth/socialaccount/providers/spotify copying allauth/socialaccount/providers/spotify/provider.py -> build/lib/allauth/socialaccount/providers/spotify copying allauth/socialaccount/providers/spotify/__init__.py -> build/lib/allauth/socialaccount/providers/spotify creating build/lib/allauth/socialaccount/providers/soundcloud copying allauth/socialaccount/providers/soundcloud/views.py -> build/lib/allauth/socialaccount/providers/soundcloud copying allauth/socialaccount/providers/soundcloud/urls.py -> build/lib/allauth/socialaccount/providers/soundcloud copying allauth/socialaccount/providers/soundcloud/tests.py -> build/lib/allauth/socialaccount/providers/soundcloud copying allauth/socialaccount/providers/soundcloud/provider.py -> build/lib/allauth/socialaccount/providers/soundcloud copying allauth/socialaccount/providers/soundcloud/__init__.py -> build/lib/allauth/socialaccount/providers/soundcloud creating build/lib/allauth/socialaccount/providers/snapchat copying allauth/socialaccount/providers/snapchat/views.py -> build/lib/allauth/socialaccount/providers/snapchat copying allauth/socialaccount/providers/snapchat/urls.py -> build/lib/allauth/socialaccount/providers/snapchat copying allauth/socialaccount/providers/snapchat/tests.py -> build/lib/allauth/socialaccount/providers/snapchat copying allauth/socialaccount/providers/snapchat/provider.py -> build/lib/allauth/socialaccount/providers/snapchat copying allauth/socialaccount/providers/snapchat/models.py -> build/lib/allauth/socialaccount/providers/snapchat copying allauth/socialaccount/providers/snapchat/constants.py -> build/lib/allauth/socialaccount/providers/snapchat copying allauth/socialaccount/providers/snapchat/__init__.py -> build/lib/allauth/socialaccount/providers/snapchat creating build/lib/allauth/socialaccount/providers/slack copying allauth/socialaccount/providers/slack/views.py -> build/lib/allauth/socialaccount/providers/slack copying allauth/socialaccount/providers/slack/urls.py -> build/lib/allauth/socialaccount/providers/slack copying allauth/socialaccount/providers/slack/tests.py -> build/lib/allauth/socialaccount/providers/slack copying allauth/socialaccount/providers/slack/provider.py -> build/lib/allauth/socialaccount/providers/slack copying allauth/socialaccount/providers/slack/models.py -> build/lib/allauth/socialaccount/providers/slack copying allauth/socialaccount/providers/slack/__init__.py -> build/lib/allauth/socialaccount/providers/slack creating build/lib/allauth/socialaccount/providers/shopify copying allauth/socialaccount/providers/shopify/views.py -> build/lib/allauth/socialaccount/providers/shopify copying allauth/socialaccount/providers/shopify/urls.py -> build/lib/allauth/socialaccount/providers/shopify copying allauth/socialaccount/providers/shopify/tests.py -> build/lib/allauth/socialaccount/providers/shopify copying allauth/socialaccount/providers/shopify/provider.py -> build/lib/allauth/socialaccount/providers/shopify copying allauth/socialaccount/providers/shopify/__init__.py -> build/lib/allauth/socialaccount/providers/shopify creating build/lib/allauth/socialaccount/providers/sharefile copying allauth/socialaccount/providers/sharefile/views.py -> build/lib/allauth/socialaccount/providers/sharefile copying allauth/socialaccount/providers/sharefile/urls.py -> build/lib/allauth/socialaccount/providers/sharefile copying allauth/socialaccount/providers/sharefile/tests.py -> build/lib/allauth/socialaccount/providers/sharefile copying allauth/socialaccount/providers/sharefile/provider.py -> build/lib/allauth/socialaccount/providers/sharefile copying allauth/socialaccount/providers/sharefile/__init__.py -> build/lib/allauth/socialaccount/providers/sharefile creating build/lib/allauth/socialaccount/providers/saml copying allauth/socialaccount/providers/saml/views.py -> build/lib/allauth/socialaccount/providers/saml copying allauth/socialaccount/providers/saml/utils.py -> build/lib/allauth/socialaccount/providers/saml copying allauth/socialaccount/providers/saml/urls.py -> build/lib/allauth/socialaccount/providers/saml copying allauth/socialaccount/providers/saml/tests.py -> build/lib/allauth/socialaccount/providers/saml copying allauth/socialaccount/providers/saml/provider.py -> build/lib/allauth/socialaccount/providers/saml copying allauth/socialaccount/providers/saml/conftest.py -> build/lib/allauth/socialaccount/providers/saml copying allauth/socialaccount/providers/saml/__init__.py -> build/lib/allauth/socialaccount/providers/saml creating build/lib/allauth/socialaccount/providers/salesforce copying allauth/socialaccount/providers/salesforce/views.py -> build/lib/allauth/socialaccount/providers/salesforce copying allauth/socialaccount/providers/salesforce/urls.py -> build/lib/allauth/socialaccount/providers/salesforce copying allauth/socialaccount/providers/salesforce/tests.py -> build/lib/allauth/socialaccount/providers/salesforce copying allauth/socialaccount/providers/salesforce/provider.py -> build/lib/allauth/socialaccount/providers/salesforce copying allauth/socialaccount/providers/salesforce/__init__.py -> build/lib/allauth/socialaccount/providers/salesforce creating build/lib/allauth/socialaccount/providers/robinhood copying allauth/socialaccount/providers/robinhood/views.py -> build/lib/allauth/socialaccount/providers/robinhood copying allauth/socialaccount/providers/robinhood/urls.py -> build/lib/allauth/socialaccount/providers/robinhood copying allauth/socialaccount/providers/robinhood/tests.py -> build/lib/allauth/socialaccount/providers/robinhood copying allauth/socialaccount/providers/robinhood/provider.py -> build/lib/allauth/socialaccount/providers/robinhood copying allauth/socialaccount/providers/robinhood/__init__.py -> build/lib/allauth/socialaccount/providers/robinhood creating build/lib/allauth/socialaccount/providers/reddit copying allauth/socialaccount/providers/reddit/views.py -> build/lib/allauth/socialaccount/providers/reddit copying allauth/socialaccount/providers/reddit/urls.py -> build/lib/allauth/socialaccount/providers/reddit copying allauth/socialaccount/providers/reddit/tests.py -> build/lib/allauth/socialaccount/providers/reddit copying allauth/socialaccount/providers/reddit/provider.py -> build/lib/allauth/socialaccount/providers/reddit copying allauth/socialaccount/providers/reddit/__init__.py -> build/lib/allauth/socialaccount/providers/reddit creating build/lib/allauth/socialaccount/providers/quickbooks copying allauth/socialaccount/providers/quickbooks/views.py -> build/lib/allauth/socialaccount/providers/quickbooks copying allauth/socialaccount/providers/quickbooks/urls.py -> build/lib/allauth/socialaccount/providers/quickbooks copying allauth/socialaccount/providers/quickbooks/tests.py -> build/lib/allauth/socialaccount/providers/quickbooks copying allauth/socialaccount/providers/quickbooks/provider.py -> build/lib/allauth/socialaccount/providers/quickbooks copying allauth/socialaccount/providers/quickbooks/models.py -> build/lib/allauth/socialaccount/providers/quickbooks copying allauth/socialaccount/providers/quickbooks/__init__.py -> build/lib/allauth/socialaccount/providers/quickbooks creating build/lib/allauth/socialaccount/providers/questrade copying allauth/socialaccount/providers/questrade/views.py -> build/lib/allauth/socialaccount/providers/questrade copying allauth/socialaccount/providers/questrade/urls.py -> build/lib/allauth/socialaccount/providers/questrade copying allauth/socialaccount/providers/questrade/tests.py -> build/lib/allauth/socialaccount/providers/questrade copying allauth/socialaccount/providers/questrade/provider.py -> build/lib/allauth/socialaccount/providers/questrade copying allauth/socialaccount/providers/questrade/__init__.py -> build/lib/allauth/socialaccount/providers/questrade creating build/lib/allauth/socialaccount/providers/pocket copying allauth/socialaccount/providers/pocket/views.py -> build/lib/allauth/socialaccount/providers/pocket copying allauth/socialaccount/providers/pocket/urls.py -> build/lib/allauth/socialaccount/providers/pocket copying allauth/socialaccount/providers/pocket/tests.py -> build/lib/allauth/socialaccount/providers/pocket copying allauth/socialaccount/providers/pocket/provider.py -> build/lib/allauth/socialaccount/providers/pocket copying allauth/socialaccount/providers/pocket/models.py -> build/lib/allauth/socialaccount/providers/pocket copying allauth/socialaccount/providers/pocket/client.py -> build/lib/allauth/socialaccount/providers/pocket copying allauth/socialaccount/providers/pocket/__init__.py -> build/lib/allauth/socialaccount/providers/pocket creating build/lib/allauth/socialaccount/providers/pinterest copying allauth/socialaccount/providers/pinterest/views.py -> build/lib/allauth/socialaccount/providers/pinterest copying allauth/socialaccount/providers/pinterest/urls.py -> build/lib/allauth/socialaccount/providers/pinterest copying allauth/socialaccount/providers/pinterest/tests.py -> build/lib/allauth/socialaccount/providers/pinterest copying allauth/socialaccount/providers/pinterest/provider.py -> build/lib/allauth/socialaccount/providers/pinterest copying allauth/socialaccount/providers/pinterest/__init__.py -> build/lib/allauth/socialaccount/providers/pinterest creating build/lib/allauth/socialaccount/providers/paypal copying allauth/socialaccount/providers/paypal/views.py -> build/lib/allauth/socialaccount/providers/paypal copying allauth/socialaccount/providers/paypal/urls.py -> build/lib/allauth/socialaccount/providers/paypal copying allauth/socialaccount/providers/paypal/tests.py -> build/lib/allauth/socialaccount/providers/paypal copying allauth/socialaccount/providers/paypal/provider.py -> build/lib/allauth/socialaccount/providers/paypal copying allauth/socialaccount/providers/paypal/__init__.py -> build/lib/allauth/socialaccount/providers/paypal creating build/lib/allauth/socialaccount/providers/patreon copying allauth/socialaccount/providers/patreon/views.py -> build/lib/allauth/socialaccount/providers/patreon copying allauth/socialaccount/providers/patreon/urls.py -> build/lib/allauth/socialaccount/providers/patreon copying allauth/socialaccount/providers/patreon/tests.py -> build/lib/allauth/socialaccount/providers/patreon copying allauth/socialaccount/providers/patreon/provider.py -> build/lib/allauth/socialaccount/providers/patreon copying allauth/socialaccount/providers/patreon/models.py -> build/lib/allauth/socialaccount/providers/patreon copying allauth/socialaccount/providers/patreon/constants.py -> build/lib/allauth/socialaccount/providers/patreon copying allauth/socialaccount/providers/patreon/__init__.py -> build/lib/allauth/socialaccount/providers/patreon creating build/lib/allauth/socialaccount/providers/orcid copying allauth/socialaccount/providers/orcid/views.py -> build/lib/allauth/socialaccount/providers/orcid copying allauth/socialaccount/providers/orcid/urls.py -> build/lib/allauth/socialaccount/providers/orcid copying allauth/socialaccount/providers/orcid/tests.py -> build/lib/allauth/socialaccount/providers/orcid copying allauth/socialaccount/providers/orcid/provider.py -> build/lib/allauth/socialaccount/providers/orcid copying allauth/socialaccount/providers/orcid/__init__.py -> build/lib/allauth/socialaccount/providers/orcid creating build/lib/allauth/socialaccount/providers/openstreetmap copying allauth/socialaccount/providers/openstreetmap/views.py -> build/lib/allauth/socialaccount/providers/openstreetmap copying allauth/socialaccount/providers/openstreetmap/urls.py -> build/lib/allauth/socialaccount/providers/openstreetmap copying allauth/socialaccount/providers/openstreetmap/tests.py -> build/lib/allauth/socialaccount/providers/openstreetmap copying allauth/socialaccount/providers/openstreetmap/provider.py -> build/lib/allauth/socialaccount/providers/openstreetmap copying allauth/socialaccount/providers/openstreetmap/__init__.py -> build/lib/allauth/socialaccount/providers/openstreetmap creating build/lib/allauth/socialaccount/providers/openid_connect copying allauth/socialaccount/providers/openid_connect/views.py -> build/lib/allauth/socialaccount/providers/openid_connect copying allauth/socialaccount/providers/openid_connect/urls.py -> build/lib/allauth/socialaccount/providers/openid_connect copying allauth/socialaccount/providers/openid_connect/tests.py -> build/lib/allauth/socialaccount/providers/openid_connect copying allauth/socialaccount/providers/openid_connect/provider.py -> build/lib/allauth/socialaccount/providers/openid_connect copying allauth/socialaccount/providers/openid_connect/__init__.py -> build/lib/allauth/socialaccount/providers/openid_connect creating build/lib/allauth/socialaccount/providers/openid copying allauth/socialaccount/providers/openid/views.py -> build/lib/allauth/socialaccount/providers/openid copying allauth/socialaccount/providers/openid/utils.py -> build/lib/allauth/socialaccount/providers/openid copying allauth/socialaccount/providers/openid/urls.py -> build/lib/allauth/socialaccount/providers/openid copying allauth/socialaccount/providers/openid/tests.py -> build/lib/allauth/socialaccount/providers/openid copying allauth/socialaccount/providers/openid/provider.py -> build/lib/allauth/socialaccount/providers/openid copying allauth/socialaccount/providers/openid/models.py -> build/lib/allauth/socialaccount/providers/openid copying allauth/socialaccount/providers/openid/forms.py -> build/lib/allauth/socialaccount/providers/openid copying allauth/socialaccount/providers/openid/admin.py -> build/lib/allauth/socialaccount/providers/openid copying allauth/socialaccount/providers/openid/__init__.py -> build/lib/allauth/socialaccount/providers/openid creating build/lib/allauth/socialaccount/providers/okta copying allauth/socialaccount/providers/okta/views.py -> build/lib/allauth/socialaccount/providers/okta copying allauth/socialaccount/providers/okta/urls.py -> build/lib/allauth/socialaccount/providers/okta copying allauth/socialaccount/providers/okta/tests.py -> build/lib/allauth/socialaccount/providers/okta copying allauth/socialaccount/providers/okta/provider.py -> build/lib/allauth/socialaccount/providers/okta copying allauth/socialaccount/providers/okta/__init__.py -> build/lib/allauth/socialaccount/providers/okta creating build/lib/allauth/socialaccount/providers/odnoklassniki copying allauth/socialaccount/providers/odnoklassniki/views.py -> build/lib/allauth/socialaccount/providers/odnoklassniki copying allauth/socialaccount/providers/odnoklassniki/urls.py -> build/lib/allauth/socialaccount/providers/odnoklassniki copying allauth/socialaccount/providers/odnoklassniki/tests.py -> build/lib/allauth/socialaccount/providers/odnoklassniki copying allauth/socialaccount/providers/odnoklassniki/provider.py -> build/lib/allauth/socialaccount/providers/odnoklassniki copying allauth/socialaccount/providers/odnoklassniki/__init__.py -> build/lib/allauth/socialaccount/providers/odnoklassniki creating build/lib/allauth/socialaccount/providers/oauth2 copying allauth/socialaccount/providers/oauth2/views.py -> build/lib/allauth/socialaccount/providers/oauth2 copying allauth/socialaccount/providers/oauth2/utils.py -> build/lib/allauth/socialaccount/providers/oauth2 copying allauth/socialaccount/providers/oauth2/urls.py -> build/lib/allauth/socialaccount/providers/oauth2 copying allauth/socialaccount/providers/oauth2/provider.py -> build/lib/allauth/socialaccount/providers/oauth2 copying allauth/socialaccount/providers/oauth2/client.py -> build/lib/allauth/socialaccount/providers/oauth2 copying allauth/socialaccount/providers/oauth2/__init__.py -> build/lib/allauth/socialaccount/providers/oauth2 creating build/lib/allauth/socialaccount/providers/oauth copying allauth/socialaccount/providers/oauth/views.py -> build/lib/allauth/socialaccount/providers/oauth copying allauth/socialaccount/providers/oauth/urls.py -> build/lib/allauth/socialaccount/providers/oauth copying allauth/socialaccount/providers/oauth/provider.py -> build/lib/allauth/socialaccount/providers/oauth copying allauth/socialaccount/providers/oauth/client.py -> build/lib/allauth/socialaccount/providers/oauth copying allauth/socialaccount/providers/oauth/__init__.py -> build/lib/allauth/socialaccount/providers/oauth creating build/lib/allauth/socialaccount/providers/notion copying allauth/socialaccount/providers/notion/views.py -> build/lib/allauth/socialaccount/providers/notion copying allauth/socialaccount/providers/notion/urls.py -> build/lib/allauth/socialaccount/providers/notion copying allauth/socialaccount/providers/notion/tests.py -> build/lib/allauth/socialaccount/providers/notion copying allauth/socialaccount/providers/notion/provider.py -> build/lib/allauth/socialaccount/providers/notion copying allauth/socialaccount/providers/notion/client.py -> build/lib/allauth/socialaccount/providers/notion copying allauth/socialaccount/providers/notion/__init__.py -> build/lib/allauth/socialaccount/providers/notion creating build/lib/allauth/socialaccount/providers/nextcloud copying allauth/socialaccount/providers/nextcloud/views.py -> build/lib/allauth/socialaccount/providers/nextcloud copying allauth/socialaccount/providers/nextcloud/urls.py -> build/lib/allauth/socialaccount/providers/nextcloud copying allauth/socialaccount/providers/nextcloud/tests.py -> build/lib/allauth/socialaccount/providers/nextcloud copying allauth/socialaccount/providers/nextcloud/provider.py -> build/lib/allauth/socialaccount/providers/nextcloud copying allauth/socialaccount/providers/nextcloud/__init__.py -> build/lib/allauth/socialaccount/providers/nextcloud creating build/lib/allauth/socialaccount/providers/netiq copying allauth/socialaccount/providers/netiq/views.py -> build/lib/allauth/socialaccount/providers/netiq copying allauth/socialaccount/providers/netiq/urls.py -> build/lib/allauth/socialaccount/providers/netiq copying allauth/socialaccount/providers/netiq/tests.py -> build/lib/allauth/socialaccount/providers/netiq copying allauth/socialaccount/providers/netiq/provider.py -> build/lib/allauth/socialaccount/providers/netiq copying allauth/socialaccount/providers/netiq/__init__.py -> build/lib/allauth/socialaccount/providers/netiq creating build/lib/allauth/socialaccount/providers/naver copying allauth/socialaccount/providers/naver/views.py -> build/lib/allauth/socialaccount/providers/naver copying allauth/socialaccount/providers/naver/urls.py -> build/lib/allauth/socialaccount/providers/naver copying allauth/socialaccount/providers/naver/tests.py -> build/lib/allauth/socialaccount/providers/naver copying allauth/socialaccount/providers/naver/provider.py -> build/lib/allauth/socialaccount/providers/naver copying allauth/socialaccount/providers/naver/models.py -> build/lib/allauth/socialaccount/providers/naver copying allauth/socialaccount/providers/naver/__init__.py -> build/lib/allauth/socialaccount/providers/naver creating build/lib/allauth/socialaccount/providers/miro copying allauth/socialaccount/providers/miro/views.py -> build/lib/allauth/socialaccount/providers/miro copying allauth/socialaccount/providers/miro/urls.py -> build/lib/allauth/socialaccount/providers/miro copying allauth/socialaccount/providers/miro/tests.py -> build/lib/allauth/socialaccount/providers/miro copying allauth/socialaccount/providers/miro/provider.py -> build/lib/allauth/socialaccount/providers/miro copying allauth/socialaccount/providers/miro/__init__.py -> build/lib/allauth/socialaccount/providers/miro creating build/lib/allauth/socialaccount/providers/microsoft copying allauth/socialaccount/providers/microsoft/views.py -> build/lib/allauth/socialaccount/providers/microsoft copying allauth/socialaccount/providers/microsoft/urls.py -> build/lib/allauth/socialaccount/providers/microsoft copying allauth/socialaccount/providers/microsoft/tests.py -> build/lib/allauth/socialaccount/providers/microsoft copying allauth/socialaccount/providers/microsoft/provider.py -> build/lib/allauth/socialaccount/providers/microsoft copying allauth/socialaccount/providers/microsoft/__init__.py -> build/lib/allauth/socialaccount/providers/microsoft creating build/lib/allauth/socialaccount/providers/meetup copying allauth/socialaccount/providers/meetup/views.py -> build/lib/allauth/socialaccount/providers/meetup copying allauth/socialaccount/providers/meetup/urls.py -> build/lib/allauth/socialaccount/providers/meetup copying allauth/socialaccount/providers/meetup/tests.py -> build/lib/allauth/socialaccount/providers/meetup copying allauth/socialaccount/providers/meetup/provider.py -> build/lib/allauth/socialaccount/providers/meetup copying allauth/socialaccount/providers/meetup/models.py -> build/lib/allauth/socialaccount/providers/meetup copying allauth/socialaccount/providers/meetup/__init__.py -> build/lib/allauth/socialaccount/providers/meetup creating build/lib/allauth/socialaccount/providers/mediawiki copying allauth/socialaccount/providers/mediawiki/views.py -> build/lib/allauth/socialaccount/providers/mediawiki copying allauth/socialaccount/providers/mediawiki/urls.py -> build/lib/allauth/socialaccount/providers/mediawiki copying allauth/socialaccount/providers/mediawiki/tests.py -> build/lib/allauth/socialaccount/providers/mediawiki copying allauth/socialaccount/providers/mediawiki/provider.py -> build/lib/allauth/socialaccount/providers/mediawiki copying allauth/socialaccount/providers/mediawiki/__init__.py -> build/lib/allauth/socialaccount/providers/mediawiki creating build/lib/allauth/socialaccount/providers/mailru copying allauth/socialaccount/providers/mailru/views.py -> build/lib/allauth/socialaccount/providers/mailru copying allauth/socialaccount/providers/mailru/urls.py -> build/lib/allauth/socialaccount/providers/mailru copying allauth/socialaccount/providers/mailru/tests.py -> build/lib/allauth/socialaccount/providers/mailru copying allauth/socialaccount/providers/mailru/provider.py -> build/lib/allauth/socialaccount/providers/mailru copying allauth/socialaccount/providers/mailru/__init__.py -> build/lib/allauth/socialaccount/providers/mailru creating build/lib/allauth/socialaccount/providers/mailchimp copying allauth/socialaccount/providers/mailchimp/views.py -> build/lib/allauth/socialaccount/providers/mailchimp copying allauth/socialaccount/providers/mailchimp/urls.py -> build/lib/allauth/socialaccount/providers/mailchimp copying allauth/socialaccount/providers/mailchimp/tests.py -> build/lib/allauth/socialaccount/providers/mailchimp copying allauth/socialaccount/providers/mailchimp/provider.py -> build/lib/allauth/socialaccount/providers/mailchimp copying allauth/socialaccount/providers/mailchimp/__init__.py -> build/lib/allauth/socialaccount/providers/mailchimp creating build/lib/allauth/socialaccount/providers/linkedin_oauth2 copying allauth/socialaccount/providers/linkedin_oauth2/views.py -> build/lib/allauth/socialaccount/providers/linkedin_oauth2 copying allauth/socialaccount/providers/linkedin_oauth2/urls.py -> build/lib/allauth/socialaccount/providers/linkedin_oauth2 copying allauth/socialaccount/providers/linkedin_oauth2/tests.py -> build/lib/allauth/socialaccount/providers/linkedin_oauth2 copying allauth/socialaccount/providers/linkedin_oauth2/provider.py -> build/lib/allauth/socialaccount/providers/linkedin_oauth2 copying allauth/socialaccount/providers/linkedin_oauth2/__init__.py -> build/lib/allauth/socialaccount/providers/linkedin_oauth2 creating build/lib/allauth/socialaccount/providers/line copying allauth/socialaccount/providers/line/views.py -> build/lib/allauth/socialaccount/providers/line copying allauth/socialaccount/providers/line/urls.py -> build/lib/allauth/socialaccount/providers/line copying allauth/socialaccount/providers/line/tests.py -> build/lib/allauth/socialaccount/providers/line copying allauth/socialaccount/providers/line/provider.py -> build/lib/allauth/socialaccount/providers/line copying allauth/socialaccount/providers/line/models.py -> build/lib/allauth/socialaccount/providers/line copying allauth/socialaccount/providers/line/__init__.py -> build/lib/allauth/socialaccount/providers/line creating build/lib/allauth/socialaccount/providers/lichess copying allauth/socialaccount/providers/lichess/views.py -> build/lib/allauth/socialaccount/providers/lichess copying allauth/socialaccount/providers/lichess/urls.py -> build/lib/allauth/socialaccount/providers/lichess copying allauth/socialaccount/providers/lichess/tests.py -> build/lib/allauth/socialaccount/providers/lichess copying allauth/socialaccount/providers/lichess/provider.py -> build/lib/allauth/socialaccount/providers/lichess copying allauth/socialaccount/providers/lichess/__init__.py -> build/lib/allauth/socialaccount/providers/lichess creating build/lib/allauth/socialaccount/providers/lemonldap copying allauth/socialaccount/providers/lemonldap/views.py -> build/lib/allauth/socialaccount/providers/lemonldap copying allauth/socialaccount/providers/lemonldap/urls.py -> build/lib/allauth/socialaccount/providers/lemonldap copying allauth/socialaccount/providers/lemonldap/tests.py -> build/lib/allauth/socialaccount/providers/lemonldap copying allauth/socialaccount/providers/lemonldap/provider.py -> build/lib/allauth/socialaccount/providers/lemonldap copying allauth/socialaccount/providers/lemonldap/__init__.py -> build/lib/allauth/socialaccount/providers/lemonldap creating build/lib/allauth/socialaccount/providers/kakao copying allauth/socialaccount/providers/kakao/views.py -> build/lib/allauth/socialaccount/providers/kakao copying allauth/socialaccount/providers/kakao/urls.py -> build/lib/allauth/socialaccount/providers/kakao copying allauth/socialaccount/providers/kakao/tests.py -> build/lib/allauth/socialaccount/providers/kakao copying allauth/socialaccount/providers/kakao/provider.py -> build/lib/allauth/socialaccount/providers/kakao copying allauth/socialaccount/providers/kakao/models.py -> build/lib/allauth/socialaccount/providers/kakao copying allauth/socialaccount/providers/kakao/__init__.py -> build/lib/allauth/socialaccount/providers/kakao creating build/lib/allauth/socialaccount/providers/jupyterhub copying allauth/socialaccount/providers/jupyterhub/views.py -> build/lib/allauth/socialaccount/providers/jupyterhub copying allauth/socialaccount/providers/jupyterhub/urls.py -> build/lib/allauth/socialaccount/providers/jupyterhub copying allauth/socialaccount/providers/jupyterhub/tests.py -> build/lib/allauth/socialaccount/providers/jupyterhub copying allauth/socialaccount/providers/jupyterhub/provider.py -> build/lib/allauth/socialaccount/providers/jupyterhub copying allauth/socialaccount/providers/jupyterhub/__init__.py -> build/lib/allauth/socialaccount/providers/jupyterhub creating build/lib/allauth/socialaccount/providers/instagram copying allauth/socialaccount/providers/instagram/views.py -> build/lib/allauth/socialaccount/providers/instagram copying allauth/socialaccount/providers/instagram/urls.py -> build/lib/allauth/socialaccount/providers/instagram copying allauth/socialaccount/providers/instagram/tests.py -> build/lib/allauth/socialaccount/providers/instagram copying allauth/socialaccount/providers/instagram/provider.py -> build/lib/allauth/socialaccount/providers/instagram copying allauth/socialaccount/providers/instagram/__init__.py -> build/lib/allauth/socialaccount/providers/instagram creating build/lib/allauth/socialaccount/providers/hubspot copying allauth/socialaccount/providers/hubspot/views.py -> build/lib/allauth/socialaccount/providers/hubspot copying allauth/socialaccount/providers/hubspot/urls.py -> build/lib/allauth/socialaccount/providers/hubspot copying allauth/socialaccount/providers/hubspot/tests.py -> build/lib/allauth/socialaccount/providers/hubspot copying allauth/socialaccount/providers/hubspot/provider.py -> build/lib/allauth/socialaccount/providers/hubspot copying allauth/socialaccount/providers/hubspot/__init__.py -> build/lib/allauth/socialaccount/providers/hubspot creating build/lib/allauth/socialaccount/providers/hubic copying allauth/socialaccount/providers/hubic/views.py -> build/lib/allauth/socialaccount/providers/hubic copying allauth/socialaccount/providers/hubic/urls.py -> build/lib/allauth/socialaccount/providers/hubic copying allauth/socialaccount/providers/hubic/tests.py -> build/lib/allauth/socialaccount/providers/hubic copying allauth/socialaccount/providers/hubic/provider.py -> build/lib/allauth/socialaccount/providers/hubic copying allauth/socialaccount/providers/hubic/__init__.py -> build/lib/allauth/socialaccount/providers/hubic creating build/lib/allauth/socialaccount/providers/gumroad copying allauth/socialaccount/providers/gumroad/views.py -> build/lib/allauth/socialaccount/providers/gumroad copying allauth/socialaccount/providers/gumroad/urls.py -> build/lib/allauth/socialaccount/providers/gumroad copying allauth/socialaccount/providers/gumroad/tests.py -> build/lib/allauth/socialaccount/providers/gumroad copying allauth/socialaccount/providers/gumroad/provider.py -> build/lib/allauth/socialaccount/providers/gumroad copying allauth/socialaccount/providers/gumroad/__init__.py -> build/lib/allauth/socialaccount/providers/gumroad creating build/lib/allauth/socialaccount/providers/google copying allauth/socialaccount/providers/google/views.py -> build/lib/allauth/socialaccount/providers/google copying allauth/socialaccount/providers/google/urls.py -> build/lib/allauth/socialaccount/providers/google copying allauth/socialaccount/providers/google/tests.py -> build/lib/allauth/socialaccount/providers/google copying allauth/socialaccount/providers/google/provider.py -> build/lib/allauth/socialaccount/providers/google copying allauth/socialaccount/providers/google/__init__.py -> build/lib/allauth/socialaccount/providers/google creating build/lib/allauth/socialaccount/providers/globus copying allauth/socialaccount/providers/globus/views.py -> build/lib/allauth/socialaccount/providers/globus copying allauth/socialaccount/providers/globus/urls.py -> build/lib/allauth/socialaccount/providers/globus copying allauth/socialaccount/providers/globus/tests.py -> build/lib/allauth/socialaccount/providers/globus copying allauth/socialaccount/providers/globus/provider.py -> build/lib/allauth/socialaccount/providers/globus copying allauth/socialaccount/providers/globus/__init__.py -> build/lib/allauth/socialaccount/providers/globus creating build/lib/allauth/socialaccount/providers/gitlab copying allauth/socialaccount/providers/gitlab/views.py -> build/lib/allauth/socialaccount/providers/gitlab copying allauth/socialaccount/providers/gitlab/urls.py -> build/lib/allauth/socialaccount/providers/gitlab copying allauth/socialaccount/providers/gitlab/tests.py -> build/lib/allauth/socialaccount/providers/gitlab copying allauth/socialaccount/providers/gitlab/provider.py -> build/lib/allauth/socialaccount/providers/gitlab copying allauth/socialaccount/providers/gitlab/__init__.py -> build/lib/allauth/socialaccount/providers/gitlab creating build/lib/allauth/socialaccount/providers/github copying allauth/socialaccount/providers/github/views.py -> build/lib/allauth/socialaccount/providers/github copying allauth/socialaccount/providers/github/urls.py -> build/lib/allauth/socialaccount/providers/github copying allauth/socialaccount/providers/github/tests.py -> build/lib/allauth/socialaccount/providers/github copying allauth/socialaccount/providers/github/provider.py -> build/lib/allauth/socialaccount/providers/github copying allauth/socialaccount/providers/github/__init__.py -> build/lib/allauth/socialaccount/providers/github creating build/lib/allauth/socialaccount/providers/gitea copying allauth/socialaccount/providers/gitea/views.py -> build/lib/allauth/socialaccount/providers/gitea copying allauth/socialaccount/providers/gitea/urls.py -> build/lib/allauth/socialaccount/providers/gitea copying allauth/socialaccount/providers/gitea/tests.py -> build/lib/allauth/socialaccount/providers/gitea copying allauth/socialaccount/providers/gitea/provider.py -> build/lib/allauth/socialaccount/providers/gitea copying allauth/socialaccount/providers/gitea/__init__.py -> build/lib/allauth/socialaccount/providers/gitea creating build/lib/allauth/socialaccount/providers/fxa copying allauth/socialaccount/providers/fxa/views.py -> build/lib/allauth/socialaccount/providers/fxa copying allauth/socialaccount/providers/fxa/urls.py -> build/lib/allauth/socialaccount/providers/fxa copying allauth/socialaccount/providers/fxa/tests.py -> build/lib/allauth/socialaccount/providers/fxa copying allauth/socialaccount/providers/fxa/provider.py -> build/lib/allauth/socialaccount/providers/fxa copying allauth/socialaccount/providers/fxa/models.py -> build/lib/allauth/socialaccount/providers/fxa copying allauth/socialaccount/providers/fxa/constants.py -> build/lib/allauth/socialaccount/providers/fxa copying allauth/socialaccount/providers/fxa/__init__.py -> build/lib/allauth/socialaccount/providers/fxa creating build/lib/allauth/socialaccount/providers/frontier copying allauth/socialaccount/providers/frontier/views.py -> build/lib/allauth/socialaccount/providers/frontier copying allauth/socialaccount/providers/frontier/urls.py -> build/lib/allauth/socialaccount/providers/frontier copying allauth/socialaccount/providers/frontier/tests.py -> build/lib/allauth/socialaccount/providers/frontier copying allauth/socialaccount/providers/frontier/provider.py -> build/lib/allauth/socialaccount/providers/frontier copying allauth/socialaccount/providers/frontier/__init__.py -> build/lib/allauth/socialaccount/providers/frontier creating build/lib/allauth/socialaccount/providers/foursquare copying allauth/socialaccount/providers/foursquare/views.py -> build/lib/allauth/socialaccount/providers/foursquare copying allauth/socialaccount/providers/foursquare/urls.py -> build/lib/allauth/socialaccount/providers/foursquare copying allauth/socialaccount/providers/foursquare/tests.py -> build/lib/allauth/socialaccount/providers/foursquare copying allauth/socialaccount/providers/foursquare/provider.py -> build/lib/allauth/socialaccount/providers/foursquare copying allauth/socialaccount/providers/foursquare/__init__.py -> build/lib/allauth/socialaccount/providers/foursquare creating build/lib/allauth/socialaccount/providers/flickr copying allauth/socialaccount/providers/flickr/views.py -> build/lib/allauth/socialaccount/providers/flickr copying allauth/socialaccount/providers/flickr/urls.py -> build/lib/allauth/socialaccount/providers/flickr copying allauth/socialaccount/providers/flickr/tests.py -> build/lib/allauth/socialaccount/providers/flickr copying allauth/socialaccount/providers/flickr/provider.py -> build/lib/allauth/socialaccount/providers/flickr copying allauth/socialaccount/providers/flickr/__init__.py -> build/lib/allauth/socialaccount/providers/flickr creating build/lib/allauth/socialaccount/providers/fivehundredpx copying allauth/socialaccount/providers/fivehundredpx/views.py -> build/lib/allauth/socialaccount/providers/fivehundredpx copying allauth/socialaccount/providers/fivehundredpx/urls.py -> build/lib/allauth/socialaccount/providers/fivehundredpx copying allauth/socialaccount/providers/fivehundredpx/tests.py -> build/lib/allauth/socialaccount/providers/fivehundredpx copying allauth/socialaccount/providers/fivehundredpx/provider.py -> build/lib/allauth/socialaccount/providers/fivehundredpx copying allauth/socialaccount/providers/fivehundredpx/models.py -> build/lib/allauth/socialaccount/providers/fivehundredpx copying allauth/socialaccount/providers/fivehundredpx/__init__.py -> build/lib/allauth/socialaccount/providers/fivehundredpx creating build/lib/allauth/socialaccount/providers/figma copying allauth/socialaccount/providers/figma/views.py -> build/lib/allauth/socialaccount/providers/figma copying allauth/socialaccount/providers/figma/urls.py -> build/lib/allauth/socialaccount/providers/figma copying allauth/socialaccount/providers/figma/tests.py -> build/lib/allauth/socialaccount/providers/figma copying allauth/socialaccount/providers/figma/provider.py -> build/lib/allauth/socialaccount/providers/figma copying allauth/socialaccount/providers/figma/__init__.py -> build/lib/allauth/socialaccount/providers/figma creating build/lib/allauth/socialaccount/providers/feishu copying allauth/socialaccount/providers/feishu/views.py -> build/lib/allauth/socialaccount/providers/feishu copying allauth/socialaccount/providers/feishu/urls.py -> build/lib/allauth/socialaccount/providers/feishu copying allauth/socialaccount/providers/feishu/tests.py -> build/lib/allauth/socialaccount/providers/feishu copying allauth/socialaccount/providers/feishu/provider.py -> build/lib/allauth/socialaccount/providers/feishu copying allauth/socialaccount/providers/feishu/client.py -> build/lib/allauth/socialaccount/providers/feishu copying allauth/socialaccount/providers/feishu/__init__.py -> build/lib/allauth/socialaccount/providers/feishu creating build/lib/allauth/socialaccount/providers/feedly copying allauth/socialaccount/providers/feedly/views.py -> build/lib/allauth/socialaccount/providers/feedly copying allauth/socialaccount/providers/feedly/urls.py -> build/lib/allauth/socialaccount/providers/feedly copying allauth/socialaccount/providers/feedly/tests.py -> build/lib/allauth/socialaccount/providers/feedly copying allauth/socialaccount/providers/feedly/provider.py -> build/lib/allauth/socialaccount/providers/feedly copying allauth/socialaccount/providers/feedly/__init__.py -> build/lib/allauth/socialaccount/providers/feedly creating build/lib/allauth/socialaccount/providers/facebook copying allauth/socialaccount/providers/facebook/views.py -> build/lib/allauth/socialaccount/providers/facebook copying allauth/socialaccount/providers/facebook/urls.py -> build/lib/allauth/socialaccount/providers/facebook copying allauth/socialaccount/providers/facebook/tests.py -> build/lib/allauth/socialaccount/providers/facebook copying allauth/socialaccount/providers/facebook/provider.py -> build/lib/allauth/socialaccount/providers/facebook copying allauth/socialaccount/providers/facebook/locale.py -> build/lib/allauth/socialaccount/providers/facebook copying allauth/socialaccount/providers/facebook/forms.py -> build/lib/allauth/socialaccount/providers/facebook copying allauth/socialaccount/providers/facebook/flows.py -> build/lib/allauth/socialaccount/providers/facebook copying allauth/socialaccount/providers/facebook/constants.py -> build/lib/allauth/socialaccount/providers/facebook copying allauth/socialaccount/providers/facebook/__init__.py -> build/lib/allauth/socialaccount/providers/facebook creating build/lib/allauth/socialaccount/providers/exist copying allauth/socialaccount/providers/exist/views.py -> build/lib/allauth/socialaccount/providers/exist copying allauth/socialaccount/providers/exist/urls.py -> build/lib/allauth/socialaccount/providers/exist copying allauth/socialaccount/providers/exist/tests.py -> build/lib/allauth/socialaccount/providers/exist copying allauth/socialaccount/providers/exist/provider.py -> build/lib/allauth/socialaccount/providers/exist copying allauth/socialaccount/providers/exist/__init__.py -> build/lib/allauth/socialaccount/providers/exist creating build/lib/allauth/socialaccount/providers/evernote copying allauth/socialaccount/providers/evernote/views.py -> build/lib/allauth/socialaccount/providers/evernote copying allauth/socialaccount/providers/evernote/urls.py -> build/lib/allauth/socialaccount/providers/evernote copying allauth/socialaccount/providers/evernote/tests.py -> build/lib/allauth/socialaccount/providers/evernote copying allauth/socialaccount/providers/evernote/provider.py -> build/lib/allauth/socialaccount/providers/evernote copying allauth/socialaccount/providers/evernote/__init__.py -> build/lib/allauth/socialaccount/providers/evernote creating build/lib/allauth/socialaccount/providers/eveonline copying allauth/socialaccount/providers/eveonline/views.py -> build/lib/allauth/socialaccount/providers/eveonline copying allauth/socialaccount/providers/eveonline/urls.py -> build/lib/allauth/socialaccount/providers/eveonline copying allauth/socialaccount/providers/eveonline/tests.py -> build/lib/allauth/socialaccount/providers/eveonline copying allauth/socialaccount/providers/eveonline/provider.py -> build/lib/allauth/socialaccount/providers/eveonline copying allauth/socialaccount/providers/eveonline/__init__.py -> build/lib/allauth/socialaccount/providers/eveonline creating build/lib/allauth/socialaccount/providers/eventbrite copying allauth/socialaccount/providers/eventbrite/views.py -> build/lib/allauth/socialaccount/providers/eventbrite copying allauth/socialaccount/providers/eventbrite/urls.py -> build/lib/allauth/socialaccount/providers/eventbrite copying allauth/socialaccount/providers/eventbrite/tests.py -> build/lib/allauth/socialaccount/providers/eventbrite copying allauth/socialaccount/providers/eventbrite/provider.py -> build/lib/allauth/socialaccount/providers/eventbrite copying allauth/socialaccount/providers/eventbrite/__init__.py -> build/lib/allauth/socialaccount/providers/eventbrite creating build/lib/allauth/socialaccount/providers/edx copying allauth/socialaccount/providers/edx/views.py -> build/lib/allauth/socialaccount/providers/edx copying allauth/socialaccount/providers/edx/urls.py -> build/lib/allauth/socialaccount/providers/edx copying allauth/socialaccount/providers/edx/tests.py -> build/lib/allauth/socialaccount/providers/edx copying allauth/socialaccount/providers/edx/provider.py -> build/lib/allauth/socialaccount/providers/edx copying allauth/socialaccount/providers/edx/__init__.py -> build/lib/allauth/socialaccount/providers/edx creating build/lib/allauth/socialaccount/providers/edmodo copying allauth/socialaccount/providers/edmodo/views.py -> build/lib/allauth/socialaccount/providers/edmodo copying allauth/socialaccount/providers/edmodo/urls.py -> build/lib/allauth/socialaccount/providers/edmodo copying allauth/socialaccount/providers/edmodo/tests.py -> build/lib/allauth/socialaccount/providers/edmodo copying allauth/socialaccount/providers/edmodo/provider.py -> build/lib/allauth/socialaccount/providers/edmodo copying allauth/socialaccount/providers/edmodo/__init__.py -> build/lib/allauth/socialaccount/providers/edmodo creating build/lib/allauth/socialaccount/providers/dwolla copying allauth/socialaccount/providers/dwolla/views.py -> build/lib/allauth/socialaccount/providers/dwolla copying allauth/socialaccount/providers/dwolla/urls.py -> build/lib/allauth/socialaccount/providers/dwolla copying allauth/socialaccount/providers/dwolla/tests.py -> build/lib/allauth/socialaccount/providers/dwolla copying allauth/socialaccount/providers/dwolla/provider.py -> build/lib/allauth/socialaccount/providers/dwolla copying allauth/socialaccount/providers/dwolla/models.py -> build/lib/allauth/socialaccount/providers/dwolla copying allauth/socialaccount/providers/dwolla/__init__.py -> build/lib/allauth/socialaccount/providers/dwolla creating build/lib/allauth/socialaccount/providers/dummy copying allauth/socialaccount/providers/dummy/views.py -> build/lib/allauth/socialaccount/providers/dummy copying allauth/socialaccount/providers/dummy/urls.py -> build/lib/allauth/socialaccount/providers/dummy copying allauth/socialaccount/providers/dummy/tests.py -> build/lib/allauth/socialaccount/providers/dummy copying allauth/socialaccount/providers/dummy/provider.py -> build/lib/allauth/socialaccount/providers/dummy copying allauth/socialaccount/providers/dummy/forms.py -> build/lib/allauth/socialaccount/providers/dummy copying allauth/socialaccount/providers/dummy/__init__.py -> build/lib/allauth/socialaccount/providers/dummy creating build/lib/allauth/socialaccount/providers/dropbox copying allauth/socialaccount/providers/dropbox/views.py -> build/lib/allauth/socialaccount/providers/dropbox copying allauth/socialaccount/providers/dropbox/urls.py -> build/lib/allauth/socialaccount/providers/dropbox copying allauth/socialaccount/providers/dropbox/tests.py -> build/lib/allauth/socialaccount/providers/dropbox copying allauth/socialaccount/providers/dropbox/provider.py -> build/lib/allauth/socialaccount/providers/dropbox copying allauth/socialaccount/providers/dropbox/__init__.py -> build/lib/allauth/socialaccount/providers/dropbox creating build/lib/allauth/socialaccount/providers/drip copying allauth/socialaccount/providers/drip/views.py -> build/lib/allauth/socialaccount/providers/drip copying allauth/socialaccount/providers/drip/urls.py -> build/lib/allauth/socialaccount/providers/drip copying allauth/socialaccount/providers/drip/tests.py -> build/lib/allauth/socialaccount/providers/drip copying allauth/socialaccount/providers/drip/provider.py -> build/lib/allauth/socialaccount/providers/drip copying allauth/socialaccount/providers/drip/__init__.py -> build/lib/allauth/socialaccount/providers/drip creating build/lib/allauth/socialaccount/providers/draugiem copying allauth/socialaccount/providers/draugiem/views.py -> build/lib/allauth/socialaccount/providers/draugiem copying allauth/socialaccount/providers/draugiem/urls.py -> build/lib/allauth/socialaccount/providers/draugiem copying allauth/socialaccount/providers/draugiem/tests.py -> build/lib/allauth/socialaccount/providers/draugiem copying allauth/socialaccount/providers/draugiem/provider.py -> build/lib/allauth/socialaccount/providers/draugiem copying allauth/socialaccount/providers/draugiem/__init__.py -> build/lib/allauth/socialaccount/providers/draugiem creating build/lib/allauth/socialaccount/providers/doximity copying allauth/socialaccount/providers/doximity/views.py -> build/lib/allauth/socialaccount/providers/doximity copying allauth/socialaccount/providers/doximity/urls.py -> build/lib/allauth/socialaccount/providers/doximity copying allauth/socialaccount/providers/doximity/tests.py -> build/lib/allauth/socialaccount/providers/doximity copying allauth/socialaccount/providers/doximity/provider.py -> build/lib/allauth/socialaccount/providers/doximity copying allauth/socialaccount/providers/doximity/__init__.py -> build/lib/allauth/socialaccount/providers/doximity creating build/lib/allauth/socialaccount/providers/douban copying allauth/socialaccount/providers/douban/views.py -> build/lib/allauth/socialaccount/providers/douban copying allauth/socialaccount/providers/douban/urls.py -> build/lib/allauth/socialaccount/providers/douban copying allauth/socialaccount/providers/douban/tests.py -> build/lib/allauth/socialaccount/providers/douban copying allauth/socialaccount/providers/douban/provider.py -> build/lib/allauth/socialaccount/providers/douban copying allauth/socialaccount/providers/douban/__init__.py -> build/lib/allauth/socialaccount/providers/douban creating build/lib/allauth/socialaccount/providers/disqus copying allauth/socialaccount/providers/disqus/views.py -> build/lib/allauth/socialaccount/providers/disqus copying allauth/socialaccount/providers/disqus/urls.py -> build/lib/allauth/socialaccount/providers/disqus copying allauth/socialaccount/providers/disqus/tests.py -> build/lib/allauth/socialaccount/providers/disqus copying allauth/socialaccount/providers/disqus/provider.py -> build/lib/allauth/socialaccount/providers/disqus copying allauth/socialaccount/providers/disqus/__init__.py -> build/lib/allauth/socialaccount/providers/disqus creating build/lib/allauth/socialaccount/providers/discord copying allauth/socialaccount/providers/discord/views.py -> build/lib/allauth/socialaccount/providers/discord copying allauth/socialaccount/providers/discord/urls.py -> build/lib/allauth/socialaccount/providers/discord copying allauth/socialaccount/providers/discord/tests.py -> build/lib/allauth/socialaccount/providers/discord copying allauth/socialaccount/providers/discord/provider.py -> build/lib/allauth/socialaccount/providers/discord copying allauth/socialaccount/providers/discord/__init__.py -> build/lib/allauth/socialaccount/providers/discord creating build/lib/allauth/socialaccount/providers/dingtalk copying allauth/socialaccount/providers/dingtalk/views.py -> build/lib/allauth/socialaccount/providers/dingtalk copying allauth/socialaccount/providers/dingtalk/urls.py -> build/lib/allauth/socialaccount/providers/dingtalk copying allauth/socialaccount/providers/dingtalk/tests.py -> build/lib/allauth/socialaccount/providers/dingtalk copying allauth/socialaccount/providers/dingtalk/provider.py -> build/lib/allauth/socialaccount/providers/dingtalk copying allauth/socialaccount/providers/dingtalk/client.py -> build/lib/allauth/socialaccount/providers/dingtalk copying allauth/socialaccount/providers/dingtalk/__init__.py -> build/lib/allauth/socialaccount/providers/dingtalk creating build/lib/allauth/socialaccount/providers/digitalocean copying allauth/socialaccount/providers/digitalocean/views.py -> build/lib/allauth/socialaccount/providers/digitalocean copying allauth/socialaccount/providers/digitalocean/urls.py -> build/lib/allauth/socialaccount/providers/digitalocean copying allauth/socialaccount/providers/digitalocean/tests.py -> build/lib/allauth/socialaccount/providers/digitalocean copying allauth/socialaccount/providers/digitalocean/provider.py -> build/lib/allauth/socialaccount/providers/digitalocean copying allauth/socialaccount/providers/digitalocean/__init__.py -> build/lib/allauth/socialaccount/providers/digitalocean creating build/lib/allauth/socialaccount/providers/daum copying allauth/socialaccount/providers/daum/views.py -> build/lib/allauth/socialaccount/providers/daum copying allauth/socialaccount/providers/daum/urls.py -> build/lib/allauth/socialaccount/providers/daum copying allauth/socialaccount/providers/daum/tests.py -> build/lib/allauth/socialaccount/providers/daum copying allauth/socialaccount/providers/daum/provider.py -> build/lib/allauth/socialaccount/providers/daum copying allauth/socialaccount/providers/daum/models.py -> build/lib/allauth/socialaccount/providers/daum copying allauth/socialaccount/providers/daum/__init__.py -> build/lib/allauth/socialaccount/providers/daum creating build/lib/allauth/socialaccount/providers/dataporten copying allauth/socialaccount/providers/dataporten/views.py -> build/lib/allauth/socialaccount/providers/dataporten copying allauth/socialaccount/providers/dataporten/urls.py -> build/lib/allauth/socialaccount/providers/dataporten copying allauth/socialaccount/providers/dataporten/tests.py -> build/lib/allauth/socialaccount/providers/dataporten copying allauth/socialaccount/providers/dataporten/provider.py -> build/lib/allauth/socialaccount/providers/dataporten copying allauth/socialaccount/providers/dataporten/models.py -> build/lib/allauth/socialaccount/providers/dataporten copying allauth/socialaccount/providers/dataporten/__init__.py -> build/lib/allauth/socialaccount/providers/dataporten creating build/lib/allauth/socialaccount/providers/coinbase copying allauth/socialaccount/providers/coinbase/views.py -> build/lib/allauth/socialaccount/providers/coinbase copying allauth/socialaccount/providers/coinbase/urls.py -> build/lib/allauth/socialaccount/providers/coinbase copying allauth/socialaccount/providers/coinbase/tests.py -> build/lib/allauth/socialaccount/providers/coinbase copying allauth/socialaccount/providers/coinbase/provider.py -> build/lib/allauth/socialaccount/providers/coinbase copying allauth/socialaccount/providers/coinbase/__init__.py -> build/lib/allauth/socialaccount/providers/coinbase creating build/lib/allauth/socialaccount/providers/clever copying allauth/socialaccount/providers/clever/views.py -> build/lib/allauth/socialaccount/providers/clever copying allauth/socialaccount/providers/clever/urls.py -> build/lib/allauth/socialaccount/providers/clever copying allauth/socialaccount/providers/clever/tests.py -> build/lib/allauth/socialaccount/providers/clever copying allauth/socialaccount/providers/clever/provider.py -> build/lib/allauth/socialaccount/providers/clever copying allauth/socialaccount/providers/clever/__init__.py -> build/lib/allauth/socialaccount/providers/clever creating build/lib/allauth/socialaccount/providers/cilogon copying allauth/socialaccount/providers/cilogon/views.py -> build/lib/allauth/socialaccount/providers/cilogon copying allauth/socialaccount/providers/cilogon/urls.py -> build/lib/allauth/socialaccount/providers/cilogon copying allauth/socialaccount/providers/cilogon/tests.py -> build/lib/allauth/socialaccount/providers/cilogon copying allauth/socialaccount/providers/cilogon/provider.py -> build/lib/allauth/socialaccount/providers/cilogon copying allauth/socialaccount/providers/cilogon/__init__.py -> build/lib/allauth/socialaccount/providers/cilogon creating build/lib/allauth/socialaccount/providers/box copying allauth/socialaccount/providers/box/views.py -> build/lib/allauth/socialaccount/providers/box copying allauth/socialaccount/providers/box/urls.py -> build/lib/allauth/socialaccount/providers/box copying allauth/socialaccount/providers/box/tests.py -> build/lib/allauth/socialaccount/providers/box copying allauth/socialaccount/providers/box/provider.py -> build/lib/allauth/socialaccount/providers/box copying allauth/socialaccount/providers/box/__init__.py -> build/lib/allauth/socialaccount/providers/box creating build/lib/allauth/socialaccount/providers/bitly copying allauth/socialaccount/providers/bitly/views.py -> build/lib/allauth/socialaccount/providers/bitly copying allauth/socialaccount/providers/bitly/urls.py -> build/lib/allauth/socialaccount/providers/bitly copying allauth/socialaccount/providers/bitly/tests.py -> build/lib/allauth/socialaccount/providers/bitly copying allauth/socialaccount/providers/bitly/provider.py -> build/lib/allauth/socialaccount/providers/bitly copying allauth/socialaccount/providers/bitly/__init__.py -> build/lib/allauth/socialaccount/providers/bitly creating build/lib/allauth/socialaccount/providers/bitbucket_oauth2 copying allauth/socialaccount/providers/bitbucket_oauth2/views.py -> build/lib/allauth/socialaccount/providers/bitbucket_oauth2 copying allauth/socialaccount/providers/bitbucket_oauth2/urls.py -> build/lib/allauth/socialaccount/providers/bitbucket_oauth2 copying allauth/socialaccount/providers/bitbucket_oauth2/tests.py -> build/lib/allauth/socialaccount/providers/bitbucket_oauth2 copying allauth/socialaccount/providers/bitbucket_oauth2/provider.py -> build/lib/allauth/socialaccount/providers/bitbucket_oauth2 copying allauth/socialaccount/providers/bitbucket_oauth2/__init__.py -> build/lib/allauth/socialaccount/providers/bitbucket_oauth2 creating build/lib/allauth/socialaccount/providers/battlenet copying allauth/socialaccount/providers/battlenet/views.py -> build/lib/allauth/socialaccount/providers/battlenet copying allauth/socialaccount/providers/battlenet/validators.py -> build/lib/allauth/socialaccount/providers/battlenet copying allauth/socialaccount/providers/battlenet/urls.py -> build/lib/allauth/socialaccount/providers/battlenet copying allauth/socialaccount/providers/battlenet/tests.py -> build/lib/allauth/socialaccount/providers/battlenet copying allauth/socialaccount/providers/battlenet/provider.py -> build/lib/allauth/socialaccount/providers/battlenet copying allauth/socialaccount/providers/battlenet/models.py -> build/lib/allauth/socialaccount/providers/battlenet copying allauth/socialaccount/providers/battlenet/__init__.py -> build/lib/allauth/socialaccount/providers/battlenet creating build/lib/allauth/socialaccount/providers/basecamp copying allauth/socialaccount/providers/basecamp/views.py -> build/lib/allauth/socialaccount/providers/basecamp copying allauth/socialaccount/providers/basecamp/urls.py -> build/lib/allauth/socialaccount/providers/basecamp copying allauth/socialaccount/providers/basecamp/tests.py -> build/lib/allauth/socialaccount/providers/basecamp copying allauth/socialaccount/providers/basecamp/provider.py -> build/lib/allauth/socialaccount/providers/basecamp copying allauth/socialaccount/providers/basecamp/__init__.py -> build/lib/allauth/socialaccount/providers/basecamp creating build/lib/allauth/socialaccount/providers/base copying allauth/socialaccount/providers/base/views.py -> build/lib/allauth/socialaccount/providers/base copying allauth/socialaccount/providers/base/utils.py -> build/lib/allauth/socialaccount/providers/base copying allauth/socialaccount/providers/base/provider.py -> build/lib/allauth/socialaccount/providers/base copying allauth/socialaccount/providers/base/constants.py -> build/lib/allauth/socialaccount/providers/base copying allauth/socialaccount/providers/base/__init__.py -> build/lib/allauth/socialaccount/providers/base creating build/lib/allauth/socialaccount/providers/baidu copying allauth/socialaccount/providers/baidu/views.py -> build/lib/allauth/socialaccount/providers/baidu copying allauth/socialaccount/providers/baidu/urls.py -> build/lib/allauth/socialaccount/providers/baidu copying allauth/socialaccount/providers/baidu/tests.py -> build/lib/allauth/socialaccount/providers/baidu copying allauth/socialaccount/providers/baidu/provider.py -> build/lib/allauth/socialaccount/providers/baidu copying allauth/socialaccount/providers/baidu/__init__.py -> build/lib/allauth/socialaccount/providers/baidu creating build/lib/allauth/socialaccount/providers/authentiq copying allauth/socialaccount/providers/authentiq/views.py -> build/lib/allauth/socialaccount/providers/authentiq copying allauth/socialaccount/providers/authentiq/urls.py -> build/lib/allauth/socialaccount/providers/authentiq copying allauth/socialaccount/providers/authentiq/tests.py -> build/lib/allauth/socialaccount/providers/authentiq copying allauth/socialaccount/providers/authentiq/provider.py -> build/lib/allauth/socialaccount/providers/authentiq copying allauth/socialaccount/providers/authentiq/__init__.py -> build/lib/allauth/socialaccount/providers/authentiq creating build/lib/allauth/socialaccount/providers/auth0 copying allauth/socialaccount/providers/auth0/views.py -> build/lib/allauth/socialaccount/providers/auth0 copying allauth/socialaccount/providers/auth0/urls.py -> build/lib/allauth/socialaccount/providers/auth0 copying allauth/socialaccount/providers/auth0/tests.py -> build/lib/allauth/socialaccount/providers/auth0 copying allauth/socialaccount/providers/auth0/provider.py -> build/lib/allauth/socialaccount/providers/auth0 copying allauth/socialaccount/providers/auth0/__init__.py -> build/lib/allauth/socialaccount/providers/auth0 creating build/lib/allauth/socialaccount/providers/atlassian copying allauth/socialaccount/providers/atlassian/views.py -> build/lib/allauth/socialaccount/providers/atlassian copying allauth/socialaccount/providers/atlassian/urls.py -> build/lib/allauth/socialaccount/providers/atlassian copying allauth/socialaccount/providers/atlassian/tests.py -> build/lib/allauth/socialaccount/providers/atlassian copying allauth/socialaccount/providers/atlassian/provider.py -> build/lib/allauth/socialaccount/providers/atlassian copying allauth/socialaccount/providers/atlassian/__init__.py -> build/lib/allauth/socialaccount/providers/atlassian creating build/lib/allauth/socialaccount/providers/asana copying allauth/socialaccount/providers/asana/views.py -> build/lib/allauth/socialaccount/providers/asana copying allauth/socialaccount/providers/asana/urls.py -> build/lib/allauth/socialaccount/providers/asana copying allauth/socialaccount/providers/asana/tests.py -> build/lib/allauth/socialaccount/providers/asana copying allauth/socialaccount/providers/asana/provider.py -> build/lib/allauth/socialaccount/providers/asana copying allauth/socialaccount/providers/asana/models.py -> build/lib/allauth/socialaccount/providers/asana copying allauth/socialaccount/providers/asana/__init__.py -> build/lib/allauth/socialaccount/providers/asana creating build/lib/allauth/socialaccount/providers/apple copying allauth/socialaccount/providers/apple/views.py -> build/lib/allauth/socialaccount/providers/apple copying allauth/socialaccount/providers/apple/urls.py -> build/lib/allauth/socialaccount/providers/apple copying allauth/socialaccount/providers/apple/tests.py -> build/lib/allauth/socialaccount/providers/apple copying allauth/socialaccount/providers/apple/provider.py -> build/lib/allauth/socialaccount/providers/apple copying allauth/socialaccount/providers/apple/client.py -> build/lib/allauth/socialaccount/providers/apple copying allauth/socialaccount/providers/apple/apple_session.py -> build/lib/allauth/socialaccount/providers/apple copying allauth/socialaccount/providers/apple/__init__.py -> build/lib/allauth/socialaccount/providers/apple creating build/lib/allauth/socialaccount/providers/angellist copying allauth/socialaccount/providers/angellist/views.py -> build/lib/allauth/socialaccount/providers/angellist copying allauth/socialaccount/providers/angellist/urls.py -> build/lib/allauth/socialaccount/providers/angellist copying allauth/socialaccount/providers/angellist/tests.py -> build/lib/allauth/socialaccount/providers/angellist copying allauth/socialaccount/providers/angellist/provider.py -> build/lib/allauth/socialaccount/providers/angellist copying allauth/socialaccount/providers/angellist/__init__.py -> build/lib/allauth/socialaccount/providers/angellist creating build/lib/allauth/socialaccount/providers/amazon_cognito copying allauth/socialaccount/providers/amazon_cognito/views.py -> build/lib/allauth/socialaccount/providers/amazon_cognito copying allauth/socialaccount/providers/amazon_cognito/utils.py -> build/lib/allauth/socialaccount/providers/amazon_cognito copying allauth/socialaccount/providers/amazon_cognito/urls.py -> build/lib/allauth/socialaccount/providers/amazon_cognito copying allauth/socialaccount/providers/amazon_cognito/tests.py -> build/lib/allauth/socialaccount/providers/amazon_cognito copying allauth/socialaccount/providers/amazon_cognito/provider.py -> build/lib/allauth/socialaccount/providers/amazon_cognito copying allauth/socialaccount/providers/amazon_cognito/__init__.py -> build/lib/allauth/socialaccount/providers/amazon_cognito creating build/lib/allauth/socialaccount/providers/amazon copying allauth/socialaccount/providers/amazon/views.py -> build/lib/allauth/socialaccount/providers/amazon copying allauth/socialaccount/providers/amazon/urls.py -> build/lib/allauth/socialaccount/providers/amazon copying allauth/socialaccount/providers/amazon/tests.py -> build/lib/allauth/socialaccount/providers/amazon copying allauth/socialaccount/providers/amazon/provider.py -> build/lib/allauth/socialaccount/providers/amazon copying allauth/socialaccount/providers/amazon/__init__.py -> build/lib/allauth/socialaccount/providers/amazon creating build/lib/allauth/socialaccount/providers/agave copying allauth/socialaccount/providers/agave/views.py -> build/lib/allauth/socialaccount/providers/agave copying allauth/socialaccount/providers/agave/urls.py -> build/lib/allauth/socialaccount/providers/agave copying allauth/socialaccount/providers/agave/tests.py -> build/lib/allauth/socialaccount/providers/agave copying allauth/socialaccount/providers/agave/provider.py -> build/lib/allauth/socialaccount/providers/agave copying allauth/socialaccount/providers/agave/__init__.py -> build/lib/allauth/socialaccount/providers/agave creating build/lib/allauth/socialaccount/providers/openid/migrations copying allauth/socialaccount/providers/openid/migrations/__init__.py -> build/lib/allauth/socialaccount/providers/openid/migrations copying allauth/socialaccount/providers/openid/migrations/0001_initial.py -> build/lib/allauth/socialaccount/providers/openid/migrations creating build/lib/allauth/socialaccount/providers/oauth2/tests copying allauth/socialaccount/providers/oauth2/tests/test_views.py -> build/lib/allauth/socialaccount/providers/oauth2/tests copying allauth/socialaccount/providers/oauth2/tests/__init__.py -> build/lib/allauth/socialaccount/providers/oauth2/tests creating build/lib/allauth/socialaccount/internal/tests copying allauth/socialaccount/internal/tests/test_statekit.py -> build/lib/allauth/socialaccount/internal/tests copying allauth/socialaccount/internal/tests/test_jwtkit.py -> build/lib/allauth/socialaccount/internal/tests copying allauth/socialaccount/internal/tests/__init__.py -> build/lib/allauth/socialaccount/internal/tests creating build/lib/allauth/socialaccount/internal/flows copying allauth/socialaccount/internal/flows/signup.py -> build/lib/allauth/socialaccount/internal/flows copying allauth/socialaccount/internal/flows/login.py -> build/lib/allauth/socialaccount/internal/flows copying allauth/socialaccount/internal/flows/email_authentication.py -> build/lib/allauth/socialaccount/internal/flows copying allauth/socialaccount/internal/flows/connect.py -> build/lib/allauth/socialaccount/internal/flows copying allauth/socialaccount/internal/flows/__init__.py -> build/lib/allauth/socialaccount/internal/flows creating build/lib/allauth/mfa/webauthn copying allauth/mfa/webauthn/views.py -> build/lib/allauth/mfa/webauthn copying allauth/mfa/webauthn/urls.py -> build/lib/allauth/mfa/webauthn copying allauth/mfa/webauthn/stages.py -> build/lib/allauth/mfa/webauthn copying allauth/mfa/webauthn/forms.py -> build/lib/allauth/mfa/webauthn copying allauth/mfa/webauthn/__init__.py -> build/lib/allauth/mfa/webauthn creating build/lib/allauth/mfa/totp copying allauth/mfa/totp/views.py -> build/lib/allauth/mfa/totp copying allauth/mfa/totp/urls.py -> build/lib/allauth/mfa/totp copying allauth/mfa/totp/forms.py -> build/lib/allauth/mfa/totp copying allauth/mfa/totp/__init__.py -> build/lib/allauth/mfa/totp creating build/lib/allauth/mfa/recovery_codes copying allauth/mfa/recovery_codes/views.py -> build/lib/allauth/mfa/recovery_codes copying allauth/mfa/recovery_codes/urls.py -> build/lib/allauth/mfa/recovery_codes copying allauth/mfa/recovery_codes/forms.py -> build/lib/allauth/mfa/recovery_codes copying allauth/mfa/recovery_codes/__init__.py -> build/lib/allauth/mfa/recovery_codes creating build/lib/allauth/mfa/migrations copying allauth/mfa/migrations/__init__.py -> build/lib/allauth/mfa/migrations copying allauth/mfa/migrations/0003_authenticator_type_uniq.py -> build/lib/allauth/mfa/migrations copying allauth/mfa/migrations/0002_authenticator_timestamps.py -> build/lib/allauth/mfa/migrations copying allauth/mfa/migrations/0001_initial.py -> build/lib/allauth/mfa/migrations creating build/lib/allauth/mfa/internal copying allauth/mfa/internal/__init__.py -> build/lib/allauth/mfa/internal creating build/lib/allauth/mfa/base copying allauth/mfa/base/views.py -> build/lib/allauth/mfa/base copying allauth/mfa/base/urls.py -> build/lib/allauth/mfa/base copying allauth/mfa/base/forms.py -> build/lib/allauth/mfa/base copying allauth/mfa/base/__init__.py -> build/lib/allauth/mfa/base creating build/lib/allauth/mfa/webauthn/tests copying allauth/mfa/webauthn/tests/test_views.py -> build/lib/allauth/mfa/webauthn/tests copying allauth/mfa/webauthn/tests/__init__.py -> build/lib/allauth/mfa/webauthn/tests creating build/lib/allauth/mfa/webauthn/internal copying allauth/mfa/webauthn/internal/flows.py -> build/lib/allauth/mfa/webauthn/internal copying allauth/mfa/webauthn/internal/auth.py -> build/lib/allauth/mfa/webauthn/internal copying allauth/mfa/webauthn/internal/__init__.py -> build/lib/allauth/mfa/webauthn/internal creating build/lib/allauth/mfa/totp/tests copying allauth/mfa/totp/tests/test_views.py -> build/lib/allauth/mfa/totp/tests copying allauth/mfa/totp/tests/test_unit.py -> build/lib/allauth/mfa/totp/tests copying allauth/mfa/totp/tests/__init__.py -> build/lib/allauth/mfa/totp/tests creating build/lib/allauth/mfa/totp/internal copying allauth/mfa/totp/internal/flows.py -> build/lib/allauth/mfa/totp/internal copying allauth/mfa/totp/internal/auth.py -> build/lib/allauth/mfa/totp/internal copying allauth/mfa/totp/internal/__init__.py -> build/lib/allauth/mfa/totp/internal creating build/lib/allauth/mfa/recovery_codes/tests copying allauth/mfa/recovery_codes/tests/test_views.py -> build/lib/allauth/mfa/recovery_codes/tests copying allauth/mfa/recovery_codes/tests/test_auth.py -> build/lib/allauth/mfa/recovery_codes/tests copying allauth/mfa/recovery_codes/tests/__init__.py -> build/lib/allauth/mfa/recovery_codes/tests creating build/lib/allauth/mfa/recovery_codes/internal copying allauth/mfa/recovery_codes/internal/flows.py -> build/lib/allauth/mfa/recovery_codes/internal copying allauth/mfa/recovery_codes/internal/auth.py -> build/lib/allauth/mfa/recovery_codes/internal copying allauth/mfa/recovery_codes/internal/__init__.py -> build/lib/allauth/mfa/recovery_codes/internal creating build/lib/allauth/mfa/internal/flows copying allauth/mfa/internal/flows/add.py -> build/lib/allauth/mfa/internal/flows copying allauth/mfa/internal/flows/__init__.py -> build/lib/allauth/mfa/internal/flows creating build/lib/allauth/mfa/base/tests copying allauth/mfa/base/tests/test_views.py -> build/lib/allauth/mfa/base/tests copying allauth/mfa/base/tests/__init__.py -> build/lib/allauth/mfa/base/tests creating build/lib/allauth/mfa/base/internal copying allauth/mfa/base/internal/flows.py -> build/lib/allauth/mfa/base/internal copying allauth/mfa/base/internal/__init__.py -> build/lib/allauth/mfa/base/internal creating build/lib/allauth/headless/usersessions copying allauth/headless/usersessions/views.py -> build/lib/allauth/headless/usersessions copying allauth/headless/usersessions/urls.py -> build/lib/allauth/headless/usersessions copying allauth/headless/usersessions/response.py -> build/lib/allauth/headless/usersessions copying allauth/headless/usersessions/inputs.py -> build/lib/allauth/headless/usersessions copying allauth/headless/usersessions/__init__.py -> build/lib/allauth/headless/usersessions creating build/lib/allauth/headless/tokens copying allauth/headless/tokens/sessions.py -> build/lib/allauth/headless/tokens copying allauth/headless/tokens/base.py -> build/lib/allauth/headless/tokens copying allauth/headless/tokens/__init__.py -> build/lib/allauth/headless/tokens creating build/lib/allauth/headless/tests copying allauth/headless/tests/test_tokens.py -> build/lib/allauth/headless/tests copying allauth/headless/tests/__init__.py -> build/lib/allauth/headless/tests creating build/lib/allauth/headless/socialaccount copying allauth/headless/socialaccount/views.py -> build/lib/allauth/headless/socialaccount copying allauth/headless/socialaccount/urls.py -> build/lib/allauth/headless/socialaccount copying allauth/headless/socialaccount/response.py -> build/lib/allauth/headless/socialaccount copying allauth/headless/socialaccount/internal.py -> build/lib/allauth/headless/socialaccount copying allauth/headless/socialaccount/inputs.py -> build/lib/allauth/headless/socialaccount copying allauth/headless/socialaccount/forms.py -> build/lib/allauth/headless/socialaccount copying allauth/headless/socialaccount/__init__.py -> build/lib/allauth/headless/socialaccount creating build/lib/allauth/headless/mfa copying allauth/headless/mfa/views.py -> build/lib/allauth/headless/mfa copying allauth/headless/mfa/urls.py -> build/lib/allauth/headless/mfa copying allauth/headless/mfa/response.py -> build/lib/allauth/headless/mfa copying allauth/headless/mfa/inputs.py -> build/lib/allauth/headless/mfa copying allauth/headless/mfa/__init__.py -> build/lib/allauth/headless/mfa creating build/lib/allauth/headless/internal copying allauth/headless/internal/sessionkit.py -> build/lib/allauth/headless/internal copying allauth/headless/internal/decorators.py -> build/lib/allauth/headless/internal copying allauth/headless/internal/authkit.py -> build/lib/allauth/headless/internal copying allauth/headless/internal/__init__.py -> build/lib/allauth/headless/internal creating build/lib/allauth/headless/base copying allauth/headless/base/views.py -> build/lib/allauth/headless/base copying allauth/headless/base/urls.py -> build/lib/allauth/headless/base copying allauth/headless/base/response.py -> build/lib/allauth/headless/base copying allauth/headless/base/__init__.py -> build/lib/allauth/headless/base creating build/lib/allauth/headless/account copying allauth/headless/account/views.py -> build/lib/allauth/headless/account copying allauth/headless/account/urls.py -> build/lib/allauth/headless/account copying allauth/headless/account/response.py -> build/lib/allauth/headless/account copying allauth/headless/account/inputs.py -> build/lib/allauth/headless/account copying allauth/headless/account/__init__.py -> build/lib/allauth/headless/account creating build/lib/allauth/headless/usersessions/tests copying allauth/headless/usersessions/tests/test_views.py -> build/lib/allauth/headless/usersessions/tests copying allauth/headless/usersessions/tests/__init__.py -> build/lib/allauth/headless/usersessions/tests creating build/lib/allauth/headless/socialaccount/tests copying allauth/headless/socialaccount/tests/test_views.py -> build/lib/allauth/headless/socialaccount/tests copying allauth/headless/socialaccount/tests/test_inputs.py -> build/lib/allauth/headless/socialaccount/tests copying allauth/headless/socialaccount/tests/__init__.py -> build/lib/allauth/headless/socialaccount/tests creating build/lib/allauth/headless/mfa/tests copying allauth/headless/mfa/tests/test_webauthn.py -> build/lib/allauth/headless/mfa/tests copying allauth/headless/mfa/tests/test_views.py -> build/lib/allauth/headless/mfa/tests copying allauth/headless/mfa/tests/test_totp.py -> build/lib/allauth/headless/mfa/tests copying allauth/headless/mfa/tests/test_recovery_codes.py -> build/lib/allauth/headless/mfa/tests copying allauth/headless/mfa/tests/__init__.py -> build/lib/allauth/headless/mfa/tests creating build/lib/allauth/headless/internal/tests copying allauth/headless/internal/tests/test_authkit.py -> build/lib/allauth/headless/internal/tests copying allauth/headless/internal/tests/__init__.py -> build/lib/allauth/headless/internal/tests creating build/lib/allauth/headless/internal/restkit copying allauth/headless/internal/restkit/views.py -> build/lib/allauth/headless/internal/restkit copying allauth/headless/internal/restkit/response.py -> build/lib/allauth/headless/internal/restkit copying allauth/headless/internal/restkit/inputs.py -> build/lib/allauth/headless/internal/restkit copying allauth/headless/internal/restkit/__init__.py -> build/lib/allauth/headless/internal/restkit creating build/lib/allauth/headless/base/tests copying allauth/headless/base/tests/test_views.py -> build/lib/allauth/headless/base/tests copying allauth/headless/base/tests/__init__.py -> build/lib/allauth/headless/base/tests creating build/lib/allauth/headless/account/tests copying allauth/headless/account/tests/test_signup.py -> build/lib/allauth/headless/account/tests copying allauth/headless/account/tests/test_session.py -> build/lib/allauth/headless/account/tests copying allauth/headless/account/tests/test_reset_password.py -> build/lib/allauth/headless/account/tests copying allauth/headless/account/tests/test_reauthentication.py -> build/lib/allauth/headless/account/tests copying allauth/headless/account/tests/test_login_by_code.py -> build/lib/allauth/headless/account/tests copying allauth/headless/account/tests/test_login.py -> build/lib/allauth/headless/account/tests copying allauth/headless/account/tests/test_email_verification_by_code.py -> build/lib/allauth/headless/account/tests copying allauth/headless/account/tests/test_email_verification.py -> build/lib/allauth/headless/account/tests copying allauth/headless/account/tests/test_change_password.py -> build/lib/allauth/headless/account/tests copying allauth/headless/account/tests/test_change_email.py -> build/lib/allauth/headless/account/tests copying allauth/headless/account/tests/__init__.py -> build/lib/allauth/headless/account/tests creating build/lib/allauth/core/tests copying allauth/core/tests/test_ratelimit.py -> build/lib/allauth/core/tests copying allauth/core/tests/__init__.py -> build/lib/allauth/core/tests creating build/lib/allauth/core/internal copying allauth/core/internal/httpkit.py -> build/lib/allauth/core/internal copying allauth/core/internal/adapter.py -> build/lib/allauth/core/internal copying allauth/core/internal/__init__.py -> build/lib/allauth/core/internal creating build/lib/allauth/core/internal/tests copying allauth/core/internal/tests/test_httpkit.py -> build/lib/allauth/core/internal/tests copying allauth/core/internal/tests/__init__.py -> build/lib/allauth/core/internal/tests creating build/lib/allauth/account/tests copying allauth/account/tests/test_utils.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_signup.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_security.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_reset_password.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_reauthentication.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_ratelimit.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_models.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_middleware.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_logout.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_login_by_code.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_login.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_email_verification_by_code.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_email_verification.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_decorators.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_commands.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_change_password.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_change_email.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_auth_backends.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_ajax.py -> build/lib/allauth/account/tests copying allauth/account/tests/test_adapter.py -> build/lib/allauth/account/tests copying allauth/account/tests/__init__.py -> build/lib/allauth/account/tests creating build/lib/allauth/account/templatetags copying allauth/account/templatetags/account.py -> build/lib/allauth/account/templatetags copying allauth/account/templatetags/__init__.py -> build/lib/allauth/account/templatetags creating build/lib/allauth/account/migrations copying allauth/account/migrations/__init__.py -> build/lib/allauth/account/migrations copying allauth/account/migrations/0009_emailaddress_unique_primary_email.py -> build/lib/allauth/account/migrations copying allauth/account/migrations/0008_emailaddress_unique_primary_email_fixup.py -> build/lib/allauth/account/migrations copying allauth/account/migrations/0007_emailaddress_idx_email.py -> build/lib/allauth/account/migrations copying allauth/account/migrations/0006_emailaddress_lower.py -> build/lib/allauth/account/migrations copying allauth/account/migrations/0005_emailaddress_idx_upper_email.py -> build/lib/allauth/account/migrations copying allauth/account/migrations/0004_alter_emailaddress_drop_unique_email.py -> build/lib/allauth/account/migrations copying allauth/account/migrations/0003_alter_emailaddress_create_unique_verified_email.py -> build/lib/allauth/account/migrations copying allauth/account/migrations/0002_email_max_length.py -> build/lib/allauth/account/migrations copying allauth/account/migrations/0001_initial.py -> build/lib/allauth/account/migrations creating build/lib/allauth/account/management copying allauth/account/management/__init__.py -> build/lib/allauth/account/management creating build/lib/allauth/account/internal copying allauth/account/internal/stagekit.py -> build/lib/allauth/account/internal copying allauth/account/internal/decorators.py -> build/lib/allauth/account/internal copying allauth/account/internal/__init__.py -> build/lib/allauth/account/internal creating build/lib/allauth/account/management/commands copying allauth/account/management/commands/account_unsetmultipleprimaryemails.py -> build/lib/allauth/account/management/commands copying allauth/account/management/commands/__init__.py -> build/lib/allauth/account/management/commands creating build/lib/allauth/account/internal/flows copying allauth/account/internal/flows/signup.py -> build/lib/allauth/account/internal/flows copying allauth/account/internal/flows/reauthentication.py -> build/lib/allauth/account/internal/flows copying allauth/account/internal/flows/password_reset.py -> build/lib/allauth/account/internal/flows copying allauth/account/internal/flows/password_change.py -> build/lib/allauth/account/internal/flows copying allauth/account/internal/flows/manage_email.py -> build/lib/allauth/account/internal/flows copying allauth/account/internal/flows/logout.py -> build/lib/allauth/account/internal/flows copying allauth/account/internal/flows/login_by_code.py -> build/lib/allauth/account/internal/flows copying allauth/account/internal/flows/login.py -> build/lib/allauth/account/internal/flows copying allauth/account/internal/flows/email_verification_by_code.py -> build/lib/allauth/account/internal/flows copying allauth/account/internal/flows/email_verification.py -> build/lib/allauth/account/internal/flows copying allauth/account/internal/flows/__init__.py -> build/lib/allauth/account/internal/flows running egg_info writing django_allauth.egg-info/PKG-INFO writing dependency_links to django_allauth.egg-info/dependency_links.txt writing requirements to django_allauth.egg-info/requires.txt writing top-level names to django_allauth.egg-info/top_level.txt reading manifest file 'django_allauth.egg-info/SOURCES.txt' reading manifest template 'MANIFEST.in' warning: no files found matching '*.mo' under directory 'allauth' adding license file 'LICENSE' adding license file 'AUTHORS' writing manifest file 'django_allauth.egg-info/SOURCES.txt' /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.ar.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.ar.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.ar.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.ar.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.ar.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.az.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.az.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.az.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.az.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.az.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.bg.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.bg.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.bg.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.bg.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.bg.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.ca.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.ca.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.ca.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.ca.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.ca.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.cs.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.cs.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.cs.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.cs.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.cs.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.da.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.da.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.da.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.da.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.da.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.de.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.de.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.de.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.de.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.de.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.el.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.el.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.el.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.el.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.el.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.en.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.en.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.en.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.en.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.en.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.es.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.es.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.es.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.es.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.es.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.et.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.et.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.et.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.et.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.et.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.eu.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.eu.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.eu.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.eu.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.eu.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.fa.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.fa.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.fa.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.fa.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.fa.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.fi.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.fi.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.fi.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.fi.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.fi.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.fr.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.fr.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.fr.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.fr.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.fr.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.he.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.he.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.he.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.he.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.he.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.hr.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.hr.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.hr.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.hr.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.hr.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.hu.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.hu.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.hu.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.hu.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.hu.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.id.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.id.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.id.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.id.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.id.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.it.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.it.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.it.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.it.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.it.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.ja.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.ja.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.ja.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.ja.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.ja.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.ka.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.ka.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.ka.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.ka.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.ka.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.ko.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.ko.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.ko.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.ko.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.ko.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.ky.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.ky.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.ky.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.ky.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.ky.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.lt.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.lt.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.lt.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.lt.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.lt.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.lv.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.lv.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.lv.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.lv.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.lv.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.mn.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.mn.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.mn.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.mn.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.mn.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.nb.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.nb.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.nb.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.nb.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.nb.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.nl.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.nl.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.nl.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.nl.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.nl.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.pl.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.pl.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.pl.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.pl.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.pl.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.pt_BR.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.pt_BR.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.pt_BR.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.pt_BR.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.pt_BR.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.pt_PT.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.pt_PT.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.pt_PT.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.pt_PT.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.pt_PT.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.ro.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.ro.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.ro.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.ro.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.ro.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.ru.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.ru.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.ru.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.ru.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.ru.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.sk.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.sk.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.sk.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.sk.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.sk.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.sl.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.sl.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.sl.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.sl.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.sl.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.sr.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.sr.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.sr.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.sr.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.sr.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.sr_Latn.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.sr_Latn.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.sr_Latn.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.sr_Latn.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.sr_Latn.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.sv.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.sv.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.sv.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.sv.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.sv.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.th.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.th.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.th.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.th.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.th.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.tr.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.tr.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.tr.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.tr.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.tr.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.uk.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.uk.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.uk.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.uk.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.uk.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.uz.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.uz.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.uz.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.uz.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.uz.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.zh_Hans.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.zh_Hans.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.zh_Hans.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.zh_Hans.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.zh_Hans.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.locale.zh_Hant.LC_MESSAGES' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.locale.zh_Hant.LC_MESSAGES' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.locale.zh_Hant.LC_MESSAGES' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.locale.zh_Hant.LC_MESSAGES' to be distributed and are already explicitly excluding 'allauth.locale.zh_Hant.LC_MESSAGES' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.mfa.static.mfa.js' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.mfa.static.mfa.js' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.mfa.static.mfa.js' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.mfa.static.mfa.js' to be distributed and are already explicitly excluding 'allauth.mfa.static.mfa.js' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.socialaccount.providers.dummy.templates.dummy' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.socialaccount.providers.dummy.templates.dummy' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.socialaccount.providers.dummy.templates.dummy' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.socialaccount.providers.dummy.templates.dummy' to be distributed and are already explicitly excluding 'allauth.socialaccount.providers.dummy.templates.dummy' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.socialaccount.providers.facebook.data' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.socialaccount.providers.facebook.data' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.socialaccount.providers.facebook.data' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.socialaccount.providers.facebook.data' to be distributed and are already explicitly excluding 'allauth.socialaccount.providers.facebook.data' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.socialaccount.providers.facebook.static.facebook.js' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.socialaccount.providers.facebook.static.facebook.js' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.socialaccount.providers.facebook.static.facebook.js' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.socialaccount.providers.facebook.static.facebook.js' to be distributed and are already explicitly excluding 'allauth.socialaccount.providers.facebook.static.facebook.js' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.socialaccount.providers.facebook.templates.facebook' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.socialaccount.providers.facebook.templates.facebook' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.socialaccount.providers.facebook.templates.facebook' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.socialaccount.providers.facebook.templates.facebook' to be distributed and are already explicitly excluding 'allauth.socialaccount.providers.facebook.templates.facebook' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.socialaccount.providers.telegram.static.telegram.js' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.socialaccount.providers.telegram.static.telegram.js' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.socialaccount.providers.telegram.static.telegram.js' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.socialaccount.providers.telegram.static.telegram.js' to be distributed and are already explicitly excluding 'allauth.socialaccount.providers.telegram.static.telegram.js' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.socialaccount.providers.telegram.templates.telegram' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.socialaccount.providers.telegram.templates.telegram' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.socialaccount.providers.telegram.templates.telegram' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.socialaccount.providers.telegram.templates.telegram' to be distributed and are already explicitly excluding 'allauth.socialaccount.providers.telegram.templates.telegram' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.account' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.account' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.account' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.account' to be distributed and are already explicitly excluding 'allauth.templates.account' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.account.email' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.account.email' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.account.email' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.account.email' to be distributed and are already explicitly excluding 'allauth.templates.account.email' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.account.messages' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.account.messages' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.account.messages' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.account.messages' to be distributed and are already explicitly excluding 'allauth.templates.account.messages' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.account.snippets' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.account.snippets' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.account.snippets' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.account.snippets' to be distributed and are already explicitly excluding 'allauth.templates.account.snippets' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.allauth.elements' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.allauth.elements' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.allauth.elements' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.allauth.elements' to be distributed and are already explicitly excluding 'allauth.templates.allauth.elements' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.allauth.layouts' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.allauth.layouts' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.allauth.layouts' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.allauth.layouts' to be distributed and are already explicitly excluding 'allauth.templates.allauth.layouts' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.mfa' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.mfa' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.mfa' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.mfa' to be distributed and are already explicitly excluding 'allauth.templates.mfa' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.mfa.email' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.mfa.email' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.mfa.email' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.mfa.email' to be distributed and are already explicitly excluding 'allauth.templates.mfa.email' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.mfa.messages' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.mfa.messages' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.mfa.messages' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.mfa.messages' to be distributed and are already explicitly excluding 'allauth.templates.mfa.messages' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.mfa.recovery_codes' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.mfa.recovery_codes' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.mfa.recovery_codes' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.mfa.recovery_codes' to be distributed and are already explicitly excluding 'allauth.templates.mfa.recovery_codes' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.mfa.totp' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.mfa.totp' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.mfa.totp' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.mfa.totp' to be distributed and are already explicitly excluding 'allauth.templates.mfa.totp' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.mfa.webauthn' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.mfa.webauthn' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.mfa.webauthn' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.mfa.webauthn' to be distributed and are already explicitly excluding 'allauth.templates.mfa.webauthn' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.mfa.webauthn.snippets' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.mfa.webauthn.snippets' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.mfa.webauthn.snippets' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.mfa.webauthn.snippets' to be distributed and are already explicitly excluding 'allauth.templates.mfa.webauthn.snippets' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.openid' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.openid' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.openid' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.openid' to be distributed and are already explicitly excluding 'allauth.templates.openid' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.socialaccount' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.socialaccount' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.socialaccount' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.socialaccount' to be distributed and are already explicitly excluding 'allauth.templates.socialaccount' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.socialaccount.email' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.socialaccount.email' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.socialaccount.email' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.socialaccount.email' to be distributed and are already explicitly excluding 'allauth.templates.socialaccount.email' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.socialaccount.messages' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.socialaccount.messages' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.socialaccount.messages' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.socialaccount.messages' to be distributed and are already explicitly excluding 'allauth.templates.socialaccount.messages' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.socialaccount.snippets' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.socialaccount.snippets' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.socialaccount.snippets' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.socialaccount.snippets' to be distributed and are already explicitly excluding 'allauth.templates.socialaccount.snippets' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.tests' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.tests' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.tests' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.tests' to be distributed and are already explicitly excluding 'allauth.templates.tests' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.usersessions' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.usersessions' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.usersessions' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.usersessions' to be distributed and are already explicitly excluding 'allauth.templates.usersessions' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) /usr/lib/python3.14/site-packages/setuptools/command/build_py.py:212: _Warning: Package 'allauth.templates.usersessions.messages' is absent from the `packages` configuration. !! ******************************************************************************** ############################ # Package would be ignored # ############################ Python recognizes 'allauth.templates.usersessions.messages' as an importable package[^1], but it is absent from setuptools' `packages` configuration. This leads to an ambiguous overall configuration. If you want to distribute this package, please make sure that 'allauth.templates.usersessions.messages' is explicitly added to the `packages` configuration field. Alternatively, you can also rely on setuptools' discovery methods (for example by using `find_namespace_packages(...)`/`find_namespace:` instead of `find_packages(...)`/`find:`). You can read more about "package discovery" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/package_discovery.html If you don't want 'allauth.templates.usersessions.messages' to be distributed and are already explicitly excluding 'allauth.templates.usersessions.messages' via `find_namespace_packages(...)/find_namespace` or `find_packages(...)/find`, you can try to use `exclude_package_data`, or `include-package-data=False` in combination with a more fine grained `package-data` configuration. You can read more about "package data files" on setuptools documentation page: - https://setuptools.pypa.io/en/latest/userguide/datafiles.html [^1]: For Python, any directory (with suitable naming) can be imported, even if it does not contain any `.py` files. On the other hand, currently there is no concept of package data directory, all directories are treated like packages. ******************************************************************************** !! check.warn(importable) creating build/lib/allauth/locale/ar/LC_MESSAGES copying allauth/locale/ar/LC_MESSAGES/django.po -> build/lib/allauth/locale/ar/LC_MESSAGES creating build/lib/allauth/locale/az/LC_MESSAGES copying allauth/locale/az/LC_MESSAGES/django.po -> build/lib/allauth/locale/az/LC_MESSAGES creating build/lib/allauth/locale/bg/LC_MESSAGES copying allauth/locale/bg/LC_MESSAGES/django.po -> build/lib/allauth/locale/bg/LC_MESSAGES creating build/lib/allauth/locale/ca/LC_MESSAGES copying allauth/locale/ca/LC_MESSAGES/django.po -> build/lib/allauth/locale/ca/LC_MESSAGES creating build/lib/allauth/locale/cs/LC_MESSAGES copying allauth/locale/cs/LC_MESSAGES/django.po -> build/lib/allauth/locale/cs/LC_MESSAGES creating build/lib/allauth/locale/da/LC_MESSAGES copying allauth/locale/da/LC_MESSAGES/django.po -> build/lib/allauth/locale/da/LC_MESSAGES creating build/lib/allauth/locale/de/LC_MESSAGES copying allauth/locale/de/LC_MESSAGES/django.po -> build/lib/allauth/locale/de/LC_MESSAGES creating build/lib/allauth/locale/el/LC_MESSAGES copying allauth/locale/el/LC_MESSAGES/django.po -> build/lib/allauth/locale/el/LC_MESSAGES creating build/lib/allauth/locale/en/LC_MESSAGES copying allauth/locale/en/LC_MESSAGES/django.po -> build/lib/allauth/locale/en/LC_MESSAGES creating build/lib/allauth/locale/es/LC_MESSAGES copying allauth/locale/es/LC_MESSAGES/django.po -> build/lib/allauth/locale/es/LC_MESSAGES creating build/lib/allauth/locale/et/LC_MESSAGES copying allauth/locale/et/LC_MESSAGES/django.po -> build/lib/allauth/locale/et/LC_MESSAGES creating build/lib/allauth/locale/eu/LC_MESSAGES copying allauth/locale/eu/LC_MESSAGES/django.po -> build/lib/allauth/locale/eu/LC_MESSAGES creating build/lib/allauth/locale/fa/LC_MESSAGES copying allauth/locale/fa/LC_MESSAGES/django.po -> build/lib/allauth/locale/fa/LC_MESSAGES creating build/lib/allauth/locale/fi/LC_MESSAGES copying allauth/locale/fi/LC_MESSAGES/django.po -> build/lib/allauth/locale/fi/LC_MESSAGES creating build/lib/allauth/locale/fr/LC_MESSAGES copying allauth/locale/fr/LC_MESSAGES/django.po -> build/lib/allauth/locale/fr/LC_MESSAGES creating build/lib/allauth/locale/he/LC_MESSAGES copying allauth/locale/he/LC_MESSAGES/django.po -> build/lib/allauth/locale/he/LC_MESSAGES creating build/lib/allauth/locale/hr/LC_MESSAGES copying allauth/locale/hr/LC_MESSAGES/django.po -> build/lib/allauth/locale/hr/LC_MESSAGES creating build/lib/allauth/locale/hu/LC_MESSAGES copying allauth/locale/hu/LC_MESSAGES/django.po -> build/lib/allauth/locale/hu/LC_MESSAGES creating build/lib/allauth/locale/id/LC_MESSAGES copying allauth/locale/id/LC_MESSAGES/django.po -> build/lib/allauth/locale/id/LC_MESSAGES creating build/lib/allauth/locale/it/LC_MESSAGES copying allauth/locale/it/LC_MESSAGES/django.po -> build/lib/allauth/locale/it/LC_MESSAGES creating build/lib/allauth/locale/ja/LC_MESSAGES copying allauth/locale/ja/LC_MESSAGES/django.po -> build/lib/allauth/locale/ja/LC_MESSAGES creating build/lib/allauth/locale/ka/LC_MESSAGES copying allauth/locale/ka/LC_MESSAGES/django.po -> build/lib/allauth/locale/ka/LC_MESSAGES creating build/lib/allauth/locale/ko/LC_MESSAGES copying allauth/locale/ko/LC_MESSAGES/django.po -> build/lib/allauth/locale/ko/LC_MESSAGES creating build/lib/allauth/locale/ky/LC_MESSAGES copying allauth/locale/ky/LC_MESSAGES/django.po -> build/lib/allauth/locale/ky/LC_MESSAGES creating build/lib/allauth/locale/lt/LC_MESSAGES copying allauth/locale/lt/LC_MESSAGES/django.po -> build/lib/allauth/locale/lt/LC_MESSAGES creating build/lib/allauth/locale/lv/LC_MESSAGES copying allauth/locale/lv/LC_MESSAGES/django.po -> build/lib/allauth/locale/lv/LC_MESSAGES creating build/lib/allauth/locale/mn/LC_MESSAGES copying allauth/locale/mn/LC_MESSAGES/django.po -> build/lib/allauth/locale/mn/LC_MESSAGES creating build/lib/allauth/locale/nb/LC_MESSAGES copying allauth/locale/nb/LC_MESSAGES/django.po -> build/lib/allauth/locale/nb/LC_MESSAGES creating build/lib/allauth/locale/nl/LC_MESSAGES copying allauth/locale/nl/LC_MESSAGES/django.po -> build/lib/allauth/locale/nl/LC_MESSAGES creating build/lib/allauth/locale/pl/LC_MESSAGES copying allauth/locale/pl/LC_MESSAGES/django.po -> build/lib/allauth/locale/pl/LC_MESSAGES creating build/lib/allauth/locale/pt_BR/LC_MESSAGES copying allauth/locale/pt_BR/LC_MESSAGES/django.po -> build/lib/allauth/locale/pt_BR/LC_MESSAGES creating build/lib/allauth/locale/pt_PT/LC_MESSAGES copying allauth/locale/pt_PT/LC_MESSAGES/django.po -> build/lib/allauth/locale/pt_PT/LC_MESSAGES creating build/lib/allauth/locale/ro/LC_MESSAGES copying allauth/locale/ro/LC_MESSAGES/django.po -> build/lib/allauth/locale/ro/LC_MESSAGES creating build/lib/allauth/locale/ru/LC_MESSAGES copying allauth/locale/ru/LC_MESSAGES/django.po -> build/lib/allauth/locale/ru/LC_MESSAGES creating build/lib/allauth/locale/sk/LC_MESSAGES copying allauth/locale/sk/LC_MESSAGES/django.po -> build/lib/allauth/locale/sk/LC_MESSAGES creating build/lib/allauth/locale/sl/LC_MESSAGES copying allauth/locale/sl/LC_MESSAGES/django.po -> build/lib/allauth/locale/sl/LC_MESSAGES creating build/lib/allauth/locale/sr/LC_MESSAGES copying allauth/locale/sr/LC_MESSAGES/django.po -> build/lib/allauth/locale/sr/LC_MESSAGES creating build/lib/allauth/locale/sr_Latn/LC_MESSAGES copying allauth/locale/sr_Latn/LC_MESSAGES/django.po -> build/lib/allauth/locale/sr_Latn/LC_MESSAGES creating build/lib/allauth/locale/sv/LC_MESSAGES copying allauth/locale/sv/LC_MESSAGES/django.po -> build/lib/allauth/locale/sv/LC_MESSAGES creating build/lib/allauth/locale/th/LC_MESSAGES copying allauth/locale/th/LC_MESSAGES/django.po -> build/lib/allauth/locale/th/LC_MESSAGES creating build/lib/allauth/locale/tr/LC_MESSAGES copying allauth/locale/tr/LC_MESSAGES/django.po -> build/lib/allauth/locale/tr/LC_MESSAGES creating build/lib/allauth/locale/uk/LC_MESSAGES copying allauth/locale/uk/LC_MESSAGES/django.po -> build/lib/allauth/locale/uk/LC_MESSAGES creating build/lib/allauth/locale/uz/LC_MESSAGES copying allauth/locale/uz/LC_MESSAGES/django.po -> build/lib/allauth/locale/uz/LC_MESSAGES creating build/lib/allauth/locale/zh_Hans/LC_MESSAGES copying allauth/locale/zh_Hans/LC_MESSAGES/django.po -> build/lib/allauth/locale/zh_Hans/LC_MESSAGES creating build/lib/allauth/locale/zh_Hant/LC_MESSAGES copying allauth/locale/zh_Hant/LC_MESSAGES/django.po -> build/lib/allauth/locale/zh_Hant/LC_MESSAGES creating build/lib/allauth/templates/account copying allauth/templates/account/account_inactive.html -> build/lib/allauth/templates/account copying allauth/templates/account/base_entrance.html -> build/lib/allauth/templates/account copying allauth/templates/account/base_manage.html -> build/lib/allauth/templates/account copying allauth/templates/account/base_manage_email.html -> build/lib/allauth/templates/account copying allauth/templates/account/base_manage_password.html -> build/lib/allauth/templates/account copying allauth/templates/account/base_reauthenticate.html -> build/lib/allauth/templates/account copying allauth/templates/account/confirm_email_verification_code.html -> build/lib/allauth/templates/account copying allauth/templates/account/confirm_login_code.html -> build/lib/allauth/templates/account copying allauth/templates/account/email.html -> build/lib/allauth/templates/account copying allauth/templates/account/email_change.html -> build/lib/allauth/templates/account copying allauth/templates/account/email_confirm.html -> build/lib/allauth/templates/account copying allauth/templates/account/login.html -> build/lib/allauth/templates/account copying allauth/templates/account/logout.html -> build/lib/allauth/templates/account copying allauth/templates/account/password_change.html -> build/lib/allauth/templates/account copying allauth/templates/account/password_reset.html -> build/lib/allauth/templates/account copying allauth/templates/account/password_reset_done.html -> build/lib/allauth/templates/account copying allauth/templates/account/password_reset_from_key.html -> build/lib/allauth/templates/account copying allauth/templates/account/password_reset_from_key_done.html -> build/lib/allauth/templates/account copying allauth/templates/account/password_set.html -> build/lib/allauth/templates/account copying allauth/templates/account/reauthenticate.html -> build/lib/allauth/templates/account copying allauth/templates/account/request_login_code.html -> build/lib/allauth/templates/account copying allauth/templates/account/signup.html -> build/lib/allauth/templates/account copying allauth/templates/account/signup_by_passkey.html -> build/lib/allauth/templates/account copying allauth/templates/account/signup_closed.html -> build/lib/allauth/templates/account copying allauth/templates/account/verification_sent.html -> build/lib/allauth/templates/account copying allauth/templates/account/verified_email_required.html -> build/lib/allauth/templates/account creating build/lib/allauth/templates/account/email copying allauth/templates/account/email/account_already_exists_message.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/account_already_exists_subject.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/base_message.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/base_notification.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/email_changed_message.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/email_changed_subject.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/email_confirm_message.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/email_confirm_subject.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/email_confirmation_message.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/email_confirmation_signup_message.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/email_confirmation_signup_subject.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/email_confirmation_subject.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/email_deleted_message.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/email_deleted_subject.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/login_code_message.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/login_code_subject.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/password_changed_message.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/password_changed_subject.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/password_reset_key_message.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/password_reset_key_subject.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/password_reset_message.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/password_reset_subject.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/password_set_message.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/password_set_subject.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/unknown_account_message.txt -> build/lib/allauth/templates/account/email copying allauth/templates/account/email/unknown_account_subject.txt -> build/lib/allauth/templates/account/email creating build/lib/allauth/templates/account/messages copying allauth/templates/account/messages/cannot_delete_primary_email.txt -> build/lib/allauth/templates/account/messages copying allauth/templates/account/messages/email_confirmation_failed.txt -> build/lib/allauth/templates/account/messages copying allauth/templates/account/messages/email_confirmation_sent.txt -> build/lib/allauth/templates/account/messages copying allauth/templates/account/messages/email_confirmed.txt -> build/lib/allauth/templates/account/messages copying allauth/templates/account/messages/email_deleted.txt -> build/lib/allauth/templates/account/messages copying allauth/templates/account/messages/logged_in.txt -> build/lib/allauth/templates/account/messages copying allauth/templates/account/messages/logged_out.txt -> build/lib/allauth/templates/account/messages copying allauth/templates/account/messages/login_code_sent.txt -> build/lib/allauth/templates/account/messages copying allauth/templates/account/messages/password_changed.txt -> build/lib/allauth/templates/account/messages copying allauth/templates/account/messages/password_set.txt -> build/lib/allauth/templates/account/messages copying allauth/templates/account/messages/primary_email_set.txt -> build/lib/allauth/templates/account/messages copying allauth/templates/account/messages/unverified_primary_email.txt -> build/lib/allauth/templates/account/messages creating build/lib/allauth/templates/account/snippets copying allauth/templates/account/snippets/already_logged_in.html -> build/lib/allauth/templates/account/snippets copying allauth/templates/account/snippets/warn_no_email.html -> build/lib/allauth/templates/account/snippets creating build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/alert.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/badge.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/button.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/button_group.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/field.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/fields.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/form.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/h1.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/h2.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/hr.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/img.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/p.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/panel.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/provider.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/provider_list.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/table.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/tbody.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/td.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/th.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/thead.html -> build/lib/allauth/templates/allauth/elements copying allauth/templates/allauth/elements/tr.html -> build/lib/allauth/templates/allauth/elements creating build/lib/allauth/templates/allauth/layouts copying allauth/templates/allauth/layouts/base.html -> build/lib/allauth/templates/allauth/layouts copying allauth/templates/allauth/layouts/entrance.html -> build/lib/allauth/templates/allauth/layouts copying allauth/templates/allauth/layouts/manage.html -> build/lib/allauth/templates/allauth/layouts creating build/lib/allauth/templates/mfa copying allauth/templates/mfa/authenticate.html -> build/lib/allauth/templates/mfa copying allauth/templates/mfa/base_entrance.html -> build/lib/allauth/templates/mfa copying allauth/templates/mfa/base_manage.html -> build/lib/allauth/templates/mfa copying allauth/templates/mfa/index.html -> build/lib/allauth/templates/mfa copying allauth/templates/mfa/reauthenticate.html -> build/lib/allauth/templates/mfa creating build/lib/allauth/templates/mfa/email copying allauth/templates/mfa/email/recovery_codes_generated_message.txt -> build/lib/allauth/templates/mfa/email copying allauth/templates/mfa/email/recovery_codes_generated_subject.txt -> build/lib/allauth/templates/mfa/email copying allauth/templates/mfa/email/totp_activated_message.txt -> build/lib/allauth/templates/mfa/email copying allauth/templates/mfa/email/totp_activated_subject.txt -> build/lib/allauth/templates/mfa/email copying allauth/templates/mfa/email/totp_deactivated_message.txt -> build/lib/allauth/templates/mfa/email copying allauth/templates/mfa/email/totp_deactivated_subject.txt -> build/lib/allauth/templates/mfa/email copying allauth/templates/mfa/email/webauthn_added_message.txt -> build/lib/allauth/templates/mfa/email copying allauth/templates/mfa/email/webauthn_added_subject.txt -> build/lib/allauth/templates/mfa/email copying allauth/templates/mfa/email/webauthn_removed_message.txt -> build/lib/allauth/templates/mfa/email copying allauth/templates/mfa/email/webauthn_removed_subject.txt -> build/lib/allauth/templates/mfa/email creating build/lib/allauth/templates/mfa/messages copying allauth/templates/mfa/messages/recovery_codes_generated.txt -> build/lib/allauth/templates/mfa/messages copying allauth/templates/mfa/messages/totp_activated.txt -> build/lib/allauth/templates/mfa/messages copying allauth/templates/mfa/messages/totp_deactivated.txt -> build/lib/allauth/templates/mfa/messages copying allauth/templates/mfa/messages/webauthn_added.txt -> build/lib/allauth/templates/mfa/messages copying allauth/templates/mfa/messages/webauthn_removed.txt -> build/lib/allauth/templates/mfa/messages creating build/lib/allauth/templates/mfa/recovery_codes copying allauth/templates/mfa/recovery_codes/base.html -> build/lib/allauth/templates/mfa/recovery_codes copying allauth/templates/mfa/recovery_codes/download.txt -> build/lib/allauth/templates/mfa/recovery_codes copying allauth/templates/mfa/recovery_codes/generate.html -> build/lib/allauth/templates/mfa/recovery_codes copying allauth/templates/mfa/recovery_codes/index.html -> build/lib/allauth/templates/mfa/recovery_codes creating build/lib/allauth/templates/mfa/totp copying allauth/templates/mfa/totp/activate_form.html -> build/lib/allauth/templates/mfa/totp copying allauth/templates/mfa/totp/base.html -> build/lib/allauth/templates/mfa/totp copying allauth/templates/mfa/totp/deactivate_form.html -> build/lib/allauth/templates/mfa/totp creating build/lib/allauth/templates/mfa/webauthn copying allauth/templates/mfa/webauthn/add_form.html -> build/lib/allauth/templates/mfa/webauthn copying allauth/templates/mfa/webauthn/authenticator_confirm_delete.html -> build/lib/allauth/templates/mfa/webauthn copying allauth/templates/mfa/webauthn/authenticator_list.html -> build/lib/allauth/templates/mfa/webauthn copying allauth/templates/mfa/webauthn/base.html -> build/lib/allauth/templates/mfa/webauthn copying allauth/templates/mfa/webauthn/edit_form.html -> build/lib/allauth/templates/mfa/webauthn copying allauth/templates/mfa/webauthn/reauthenticate.html -> build/lib/allauth/templates/mfa/webauthn copying allauth/templates/mfa/webauthn/signup_form.html -> build/lib/allauth/templates/mfa/webauthn creating build/lib/allauth/templates/mfa/webauthn/snippets copying allauth/templates/mfa/webauthn/snippets/login_script.html -> build/lib/allauth/templates/mfa/webauthn/snippets copying allauth/templates/mfa/webauthn/snippets/scripts.html -> build/lib/allauth/templates/mfa/webauthn/snippets creating build/lib/allauth/templates/openid copying allauth/templates/openid/base.html -> build/lib/allauth/templates/openid copying allauth/templates/openid/login.html -> build/lib/allauth/templates/openid creating build/lib/allauth/templates/socialaccount copying allauth/templates/socialaccount/authentication_error.html -> build/lib/allauth/templates/socialaccount copying allauth/templates/socialaccount/base_entrance.html -> build/lib/allauth/templates/socialaccount copying allauth/templates/socialaccount/base_manage.html -> build/lib/allauth/templates/socialaccount copying allauth/templates/socialaccount/connections.html -> build/lib/allauth/templates/socialaccount copying allauth/templates/socialaccount/login.html -> build/lib/allauth/templates/socialaccount copying allauth/templates/socialaccount/login_cancelled.html -> build/lib/allauth/templates/socialaccount copying allauth/templates/socialaccount/login_redirect.html -> build/lib/allauth/templates/socialaccount copying allauth/templates/socialaccount/signup.html -> build/lib/allauth/templates/socialaccount creating build/lib/allauth/templates/socialaccount/email copying allauth/templates/socialaccount/email/account_connected_message.txt -> build/lib/allauth/templates/socialaccount/email copying allauth/templates/socialaccount/email/account_connected_subject.txt -> build/lib/allauth/templates/socialaccount/email copying allauth/templates/socialaccount/email/account_disconnected_message.txt -> build/lib/allauth/templates/socialaccount/email copying allauth/templates/socialaccount/email/account_disconnected_subject.txt -> build/lib/allauth/templates/socialaccount/email creating build/lib/allauth/templates/socialaccount/messages copying allauth/templates/socialaccount/messages/account_connected.txt -> build/lib/allauth/templates/socialaccount/messages copying allauth/templates/socialaccount/messages/account_connected_other.txt -> build/lib/allauth/templates/socialaccount/messages copying allauth/templates/socialaccount/messages/account_connected_updated.txt -> build/lib/allauth/templates/socialaccount/messages copying allauth/templates/socialaccount/messages/account_disconnected.txt -> build/lib/allauth/templates/socialaccount/messages creating build/lib/allauth/templates/socialaccount/snippets copying allauth/templates/socialaccount/snippets/login.html -> build/lib/allauth/templates/socialaccount/snippets copying allauth/templates/socialaccount/snippets/login_extra.html -> build/lib/allauth/templates/socialaccount/snippets copying allauth/templates/socialaccount/snippets/provider_list.html -> build/lib/allauth/templates/socialaccount/snippets creating build/lib/allauth/templates/tests copying allauth/templates/tests/test_403_csrf.html -> build/lib/allauth/templates/tests creating build/lib/allauth/templates/usersessions copying allauth/templates/usersessions/base_manage.html -> build/lib/allauth/templates/usersessions copying allauth/templates/usersessions/usersession_list.html -> build/lib/allauth/templates/usersessions creating build/lib/allauth/templates/usersessions/messages copying allauth/templates/usersessions/messages/sessions_logged_out.txt -> build/lib/allauth/templates/usersessions/messages creating build/lib/allauth/mfa/static/mfa/js copying allauth/mfa/static/mfa/js/webauthn-json.js -> build/lib/allauth/mfa/static/mfa/js copying allauth/mfa/static/mfa/js/webauthn.js -> build/lib/allauth/mfa/static/mfa/js creating build/lib/allauth/socialaccount/providers/telegram/static/telegram/js copying allauth/socialaccount/providers/telegram/static/telegram/js/telegram.js -> build/lib/allauth/socialaccount/providers/telegram/static/telegram/js creating build/lib/allauth/socialaccount/providers/telegram/templates/telegram copying allauth/socialaccount/providers/telegram/templates/telegram/callback.html -> build/lib/allauth/socialaccount/providers/telegram/templates/telegram creating build/lib/allauth/socialaccount/providers/facebook/data copying allauth/socialaccount/providers/facebook/data/FacebookLocales.xml -> build/lib/allauth/socialaccount/providers/facebook/data creating build/lib/allauth/socialaccount/providers/facebook/static/facebook/js copying allauth/socialaccount/providers/facebook/static/facebook/js/fbconnect.js -> build/lib/allauth/socialaccount/providers/facebook/static/facebook/js creating build/lib/allauth/socialaccount/providers/facebook/templates/facebook copying allauth/socialaccount/providers/facebook/templates/facebook/fbconnect.html -> build/lib/allauth/socialaccount/providers/facebook/templates/facebook creating build/lib/allauth/socialaccount/providers/dummy/templates/dummy copying allauth/socialaccount/providers/dummy/templates/dummy/authenticate_form.html -> build/lib/allauth/socialaccount/providers/dummy/templates/dummy installing to build/bdist.linux-x86_64/wheel running install running install_lib creating build/bdist.linux-x86_64/wheel creating build/bdist.linux-x86_64/wheel/allauth creating build/bdist.linux-x86_64/wheel/allauth/templates creating build/bdist.linux-x86_64/wheel/allauth/templates/usersessions creating build/bdist.linux-x86_64/wheel/allauth/templates/usersessions/messages copying build/lib/allauth/templates/usersessions/messages/sessions_logged_out.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/usersessions/messages copying build/lib/allauth/templates/usersessions/usersession_list.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/usersessions copying build/lib/allauth/templates/usersessions/base_manage.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/usersessions creating build/bdist.linux-x86_64/wheel/allauth/templates/tests copying build/lib/allauth/templates/tests/test_403_csrf.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/tests creating build/bdist.linux-x86_64/wheel/allauth/templates/socialaccount creating build/bdist.linux-x86_64/wheel/allauth/templates/socialaccount/snippets copying build/lib/allauth/templates/socialaccount/snippets/provider_list.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount/snippets copying build/lib/allauth/templates/socialaccount/snippets/login_extra.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount/snippets copying build/lib/allauth/templates/socialaccount/snippets/login.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount/snippets creating build/bdist.linux-x86_64/wheel/allauth/templates/socialaccount/messages copying build/lib/allauth/templates/socialaccount/messages/account_disconnected.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount/messages copying build/lib/allauth/templates/socialaccount/messages/account_connected_updated.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount/messages copying build/lib/allauth/templates/socialaccount/messages/account_connected_other.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount/messages copying build/lib/allauth/templates/socialaccount/messages/account_connected.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount/messages creating build/bdist.linux-x86_64/wheel/allauth/templates/socialaccount/email copying build/lib/allauth/templates/socialaccount/email/account_disconnected_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount/email copying build/lib/allauth/templates/socialaccount/email/account_disconnected_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount/email copying build/lib/allauth/templates/socialaccount/email/account_connected_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount/email copying build/lib/allauth/templates/socialaccount/email/account_connected_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount/email copying build/lib/allauth/templates/socialaccount/signup.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount copying build/lib/allauth/templates/socialaccount/login_redirect.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount copying build/lib/allauth/templates/socialaccount/login_cancelled.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount copying build/lib/allauth/templates/socialaccount/login.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount copying build/lib/allauth/templates/socialaccount/connections.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount copying build/lib/allauth/templates/socialaccount/base_manage.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount copying build/lib/allauth/templates/socialaccount/base_entrance.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount copying build/lib/allauth/templates/socialaccount/authentication_error.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/socialaccount creating build/bdist.linux-x86_64/wheel/allauth/templates/openid copying build/lib/allauth/templates/openid/login.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/openid copying build/lib/allauth/templates/openid/base.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/openid creating build/bdist.linux-x86_64/wheel/allauth/templates/mfa creating build/bdist.linux-x86_64/wheel/allauth/templates/mfa/webauthn creating build/bdist.linux-x86_64/wheel/allauth/templates/mfa/webauthn/snippets copying build/lib/allauth/templates/mfa/webauthn/snippets/scripts.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/webauthn/snippets copying build/lib/allauth/templates/mfa/webauthn/snippets/login_script.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/webauthn/snippets copying build/lib/allauth/templates/mfa/webauthn/signup_form.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/webauthn copying build/lib/allauth/templates/mfa/webauthn/reauthenticate.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/webauthn copying build/lib/allauth/templates/mfa/webauthn/edit_form.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/webauthn copying build/lib/allauth/templates/mfa/webauthn/base.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/webauthn copying build/lib/allauth/templates/mfa/webauthn/authenticator_list.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/webauthn copying build/lib/allauth/templates/mfa/webauthn/authenticator_confirm_delete.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/webauthn copying build/lib/allauth/templates/mfa/webauthn/add_form.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/webauthn creating build/bdist.linux-x86_64/wheel/allauth/templates/mfa/totp copying build/lib/allauth/templates/mfa/totp/deactivate_form.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/totp copying build/lib/allauth/templates/mfa/totp/base.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/totp copying build/lib/allauth/templates/mfa/totp/activate_form.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/totp creating build/bdist.linux-x86_64/wheel/allauth/templates/mfa/recovery_codes copying build/lib/allauth/templates/mfa/recovery_codes/index.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/recovery_codes copying build/lib/allauth/templates/mfa/recovery_codes/generate.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/recovery_codes copying build/lib/allauth/templates/mfa/recovery_codes/download.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/recovery_codes copying build/lib/allauth/templates/mfa/recovery_codes/base.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/recovery_codes creating build/bdist.linux-x86_64/wheel/allauth/templates/mfa/messages copying build/lib/allauth/templates/mfa/messages/webauthn_removed.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/messages copying build/lib/allauth/templates/mfa/messages/webauthn_added.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/messages copying build/lib/allauth/templates/mfa/messages/totp_deactivated.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/messages copying build/lib/allauth/templates/mfa/messages/totp_activated.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/messages copying build/lib/allauth/templates/mfa/messages/recovery_codes_generated.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/messages creating build/bdist.linux-x86_64/wheel/allauth/templates/mfa/email copying build/lib/allauth/templates/mfa/email/webauthn_removed_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/email copying build/lib/allauth/templates/mfa/email/webauthn_removed_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/email copying build/lib/allauth/templates/mfa/email/webauthn_added_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/email copying build/lib/allauth/templates/mfa/email/webauthn_added_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/email copying build/lib/allauth/templates/mfa/email/totp_deactivated_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/email copying build/lib/allauth/templates/mfa/email/totp_deactivated_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/email copying build/lib/allauth/templates/mfa/email/totp_activated_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/email copying build/lib/allauth/templates/mfa/email/totp_activated_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/email copying build/lib/allauth/templates/mfa/email/recovery_codes_generated_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/email copying build/lib/allauth/templates/mfa/email/recovery_codes_generated_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa/email copying build/lib/allauth/templates/mfa/reauthenticate.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa copying build/lib/allauth/templates/mfa/index.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa copying build/lib/allauth/templates/mfa/base_manage.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa copying build/lib/allauth/templates/mfa/base_entrance.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa copying build/lib/allauth/templates/mfa/authenticate.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/mfa creating build/bdist.linux-x86_64/wheel/allauth/templates/allauth creating build/bdist.linux-x86_64/wheel/allauth/templates/allauth/layouts copying build/lib/allauth/templates/allauth/layouts/manage.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/layouts copying build/lib/allauth/templates/allauth/layouts/entrance.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/layouts copying build/lib/allauth/templates/allauth/layouts/base.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/layouts creating build/bdist.linux-x86_64/wheel/allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/tr.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/thead.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/th.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/td.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/tbody.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/table.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/provider_list.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/provider.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/panel.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/p.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/img.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/hr.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/h2.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/h1.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/form.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/fields.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/field.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/button_group.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/button.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/badge.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements copying build/lib/allauth/templates/allauth/elements/alert.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/allauth/elements creating build/bdist.linux-x86_64/wheel/allauth/templates/account creating build/bdist.linux-x86_64/wheel/allauth/templates/account/snippets copying build/lib/allauth/templates/account/snippets/warn_no_email.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/snippets copying build/lib/allauth/templates/account/snippets/already_logged_in.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/snippets creating build/bdist.linux-x86_64/wheel/allauth/templates/account/messages copying build/lib/allauth/templates/account/messages/unverified_primary_email.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/messages copying build/lib/allauth/templates/account/messages/primary_email_set.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/messages copying build/lib/allauth/templates/account/messages/password_set.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/messages copying build/lib/allauth/templates/account/messages/password_changed.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/messages copying build/lib/allauth/templates/account/messages/login_code_sent.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/messages copying build/lib/allauth/templates/account/messages/logged_out.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/messages copying build/lib/allauth/templates/account/messages/logged_in.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/messages copying build/lib/allauth/templates/account/messages/email_deleted.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/messages copying build/lib/allauth/templates/account/messages/email_confirmed.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/messages copying build/lib/allauth/templates/account/messages/email_confirmation_sent.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/messages copying build/lib/allauth/templates/account/messages/email_confirmation_failed.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/messages copying build/lib/allauth/templates/account/messages/cannot_delete_primary_email.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/messages creating build/bdist.linux-x86_64/wheel/allauth/templates/account/email copying build/lib/allauth/templates/account/email/unknown_account_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/unknown_account_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/password_set_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/password_set_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/password_reset_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/password_reset_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/password_reset_key_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/password_reset_key_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/password_changed_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/password_changed_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/login_code_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/login_code_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/email_deleted_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/email_deleted_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/email_confirmation_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/email_confirmation_signup_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/email_confirmation_signup_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/email_confirmation_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/email_confirm_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/email_confirm_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/email_changed_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/email_changed_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/base_notification.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/base_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/account_already_exists_subject.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/email/account_already_exists_message.txt -> build/bdist.linux-x86_64/wheel/./allauth/templates/account/email copying build/lib/allauth/templates/account/verified_email_required.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/verification_sent.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/signup_closed.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/signup_by_passkey.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/signup.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/request_login_code.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/reauthenticate.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/password_set.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/password_reset_from_key_done.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/password_reset_from_key.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/password_reset_done.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/password_reset.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/password_change.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/logout.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/login.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/email_confirm.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/email_change.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/email.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/confirm_login_code.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/confirm_email_verification_code.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/base_reauthenticate.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/base_manage_password.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/base_manage_email.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/base_manage.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/base_entrance.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account copying build/lib/allauth/templates/account/account_inactive.html -> build/bdist.linux-x86_64/wheel/./allauth/templates/account creating build/bdist.linux-x86_64/wheel/allauth/locale creating build/bdist.linux-x86_64/wheel/allauth/locale/zh_Hant creating build/bdist.linux-x86_64/wheel/allauth/locale/zh_Hant/LC_MESSAGES copying build/lib/allauth/locale/zh_Hant/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/zh_Hant/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/zh_Hans creating build/bdist.linux-x86_64/wheel/allauth/locale/zh_Hans/LC_MESSAGES copying build/lib/allauth/locale/zh_Hans/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/zh_Hans/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/uz creating build/bdist.linux-x86_64/wheel/allauth/locale/uz/LC_MESSAGES copying build/lib/allauth/locale/uz/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/uz/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/uk creating build/bdist.linux-x86_64/wheel/allauth/locale/uk/LC_MESSAGES copying build/lib/allauth/locale/uk/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/uk/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/tr creating build/bdist.linux-x86_64/wheel/allauth/locale/tr/LC_MESSAGES copying build/lib/allauth/locale/tr/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/tr/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/th creating build/bdist.linux-x86_64/wheel/allauth/locale/th/LC_MESSAGES copying build/lib/allauth/locale/th/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/th/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/sv creating build/bdist.linux-x86_64/wheel/allauth/locale/sv/LC_MESSAGES copying build/lib/allauth/locale/sv/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/sv/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/sr_Latn creating build/bdist.linux-x86_64/wheel/allauth/locale/sr_Latn/LC_MESSAGES copying build/lib/allauth/locale/sr_Latn/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/sr_Latn/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/sr creating build/bdist.linux-x86_64/wheel/allauth/locale/sr/LC_MESSAGES copying build/lib/allauth/locale/sr/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/sr/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/sl creating build/bdist.linux-x86_64/wheel/allauth/locale/sl/LC_MESSAGES copying build/lib/allauth/locale/sl/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/sl/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/sk creating build/bdist.linux-x86_64/wheel/allauth/locale/sk/LC_MESSAGES copying build/lib/allauth/locale/sk/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/sk/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/ru creating build/bdist.linux-x86_64/wheel/allauth/locale/ru/LC_MESSAGES copying build/lib/allauth/locale/ru/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/ru/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/ro creating build/bdist.linux-x86_64/wheel/allauth/locale/ro/LC_MESSAGES copying build/lib/allauth/locale/ro/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/ro/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/pt_PT creating build/bdist.linux-x86_64/wheel/allauth/locale/pt_PT/LC_MESSAGES copying build/lib/allauth/locale/pt_PT/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/pt_PT/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/pt_BR creating build/bdist.linux-x86_64/wheel/allauth/locale/pt_BR/LC_MESSAGES copying build/lib/allauth/locale/pt_BR/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/pt_BR/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/pl creating build/bdist.linux-x86_64/wheel/allauth/locale/pl/LC_MESSAGES copying build/lib/allauth/locale/pl/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/pl/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/nl creating build/bdist.linux-x86_64/wheel/allauth/locale/nl/LC_MESSAGES copying build/lib/allauth/locale/nl/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/nl/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/nb creating build/bdist.linux-x86_64/wheel/allauth/locale/nb/LC_MESSAGES copying build/lib/allauth/locale/nb/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/nb/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/mn creating build/bdist.linux-x86_64/wheel/allauth/locale/mn/LC_MESSAGES copying build/lib/allauth/locale/mn/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/mn/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/lv creating build/bdist.linux-x86_64/wheel/allauth/locale/lv/LC_MESSAGES copying build/lib/allauth/locale/lv/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/lv/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/lt creating build/bdist.linux-x86_64/wheel/allauth/locale/lt/LC_MESSAGES copying build/lib/allauth/locale/lt/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/lt/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/ky creating build/bdist.linux-x86_64/wheel/allauth/locale/ky/LC_MESSAGES copying build/lib/allauth/locale/ky/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/ky/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/ko creating build/bdist.linux-x86_64/wheel/allauth/locale/ko/LC_MESSAGES copying build/lib/allauth/locale/ko/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/ko/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/ka creating build/bdist.linux-x86_64/wheel/allauth/locale/ka/LC_MESSAGES copying build/lib/allauth/locale/ka/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/ka/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/ja creating build/bdist.linux-x86_64/wheel/allauth/locale/ja/LC_MESSAGES copying build/lib/allauth/locale/ja/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/ja/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/it creating build/bdist.linux-x86_64/wheel/allauth/locale/it/LC_MESSAGES copying build/lib/allauth/locale/it/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/it/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/id creating build/bdist.linux-x86_64/wheel/allauth/locale/id/LC_MESSAGES copying build/lib/allauth/locale/id/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/id/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/hu creating build/bdist.linux-x86_64/wheel/allauth/locale/hu/LC_MESSAGES copying build/lib/allauth/locale/hu/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/hu/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/hr creating build/bdist.linux-x86_64/wheel/allauth/locale/hr/LC_MESSAGES copying build/lib/allauth/locale/hr/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/hr/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/he creating build/bdist.linux-x86_64/wheel/allauth/locale/he/LC_MESSAGES copying build/lib/allauth/locale/he/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/he/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/fr creating build/bdist.linux-x86_64/wheel/allauth/locale/fr/LC_MESSAGES copying build/lib/allauth/locale/fr/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/fr/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/fi creating build/bdist.linux-x86_64/wheel/allauth/locale/fi/LC_MESSAGES copying build/lib/allauth/locale/fi/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/fi/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/fa creating build/bdist.linux-x86_64/wheel/allauth/locale/fa/LC_MESSAGES copying build/lib/allauth/locale/fa/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/fa/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/eu creating build/bdist.linux-x86_64/wheel/allauth/locale/eu/LC_MESSAGES copying build/lib/allauth/locale/eu/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/eu/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/et creating build/bdist.linux-x86_64/wheel/allauth/locale/et/LC_MESSAGES copying build/lib/allauth/locale/et/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/et/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/es creating build/bdist.linux-x86_64/wheel/allauth/locale/es/LC_MESSAGES copying build/lib/allauth/locale/es/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/es/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/en creating build/bdist.linux-x86_64/wheel/allauth/locale/en/LC_MESSAGES copying build/lib/allauth/locale/en/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/en/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/el creating build/bdist.linux-x86_64/wheel/allauth/locale/el/LC_MESSAGES copying build/lib/allauth/locale/el/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/el/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/de creating build/bdist.linux-x86_64/wheel/allauth/locale/de/LC_MESSAGES copying build/lib/allauth/locale/de/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/de/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/da creating build/bdist.linux-x86_64/wheel/allauth/locale/da/LC_MESSAGES copying build/lib/allauth/locale/da/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/da/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/cs creating build/bdist.linux-x86_64/wheel/allauth/locale/cs/LC_MESSAGES copying build/lib/allauth/locale/cs/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/cs/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/ca creating build/bdist.linux-x86_64/wheel/allauth/locale/ca/LC_MESSAGES copying build/lib/allauth/locale/ca/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/ca/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/bg creating build/bdist.linux-x86_64/wheel/allauth/locale/bg/LC_MESSAGES copying build/lib/allauth/locale/bg/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/bg/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/az creating build/bdist.linux-x86_64/wheel/allauth/locale/az/LC_MESSAGES copying build/lib/allauth/locale/az/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/az/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/locale/ar creating build/bdist.linux-x86_64/wheel/allauth/locale/ar/LC_MESSAGES copying build/lib/allauth/locale/ar/LC_MESSAGES/django.po -> build/bdist.linux-x86_64/wheel/./allauth/locale/ar/LC_MESSAGES creating build/bdist.linux-x86_64/wheel/allauth/account creating build/bdist.linux-x86_64/wheel/allauth/account/internal creating build/bdist.linux-x86_64/wheel/allauth/account/internal/flows copying build/lib/allauth/account/internal/flows/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/account/internal/flows copying build/lib/allauth/account/internal/flows/email_verification.py -> build/bdist.linux-x86_64/wheel/./allauth/account/internal/flows copying build/lib/allauth/account/internal/flows/email_verification_by_code.py -> build/bdist.linux-x86_64/wheel/./allauth/account/internal/flows copying build/lib/allauth/account/internal/flows/login.py -> build/bdist.linux-x86_64/wheel/./allauth/account/internal/flows copying build/lib/allauth/account/internal/flows/login_by_code.py -> build/bdist.linux-x86_64/wheel/./allauth/account/internal/flows copying build/lib/allauth/account/internal/flows/logout.py -> build/bdist.linux-x86_64/wheel/./allauth/account/internal/flows copying build/lib/allauth/account/internal/flows/manage_email.py -> build/bdist.linux-x86_64/wheel/./allauth/account/internal/flows copying build/lib/allauth/account/internal/flows/password_change.py -> build/bdist.linux-x86_64/wheel/./allauth/account/internal/flows copying build/lib/allauth/account/internal/flows/password_reset.py -> build/bdist.linux-x86_64/wheel/./allauth/account/internal/flows copying build/lib/allauth/account/internal/flows/reauthentication.py -> build/bdist.linux-x86_64/wheel/./allauth/account/internal/flows copying build/lib/allauth/account/internal/flows/signup.py -> build/bdist.linux-x86_64/wheel/./allauth/account/internal/flows copying build/lib/allauth/account/internal/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/account/internal copying build/lib/allauth/account/internal/decorators.py -> build/bdist.linux-x86_64/wheel/./allauth/account/internal copying build/lib/allauth/account/internal/stagekit.py -> build/bdist.linux-x86_64/wheel/./allauth/account/internal creating build/bdist.linux-x86_64/wheel/allauth/account/management creating build/bdist.linux-x86_64/wheel/allauth/account/management/commands copying build/lib/allauth/account/management/commands/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/account/management/commands copying build/lib/allauth/account/management/commands/account_unsetmultipleprimaryemails.py -> build/bdist.linux-x86_64/wheel/./allauth/account/management/commands copying build/lib/allauth/account/management/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/account/management creating build/bdist.linux-x86_64/wheel/allauth/account/migrations copying build/lib/allauth/account/migrations/0001_initial.py -> build/bdist.linux-x86_64/wheel/./allauth/account/migrations copying build/lib/allauth/account/migrations/0002_email_max_length.py -> build/bdist.linux-x86_64/wheel/./allauth/account/migrations copying build/lib/allauth/account/migrations/0003_alter_emailaddress_create_unique_verified_email.py -> build/bdist.linux-x86_64/wheel/./allauth/account/migrations copying build/lib/allauth/account/migrations/0004_alter_emailaddress_drop_unique_email.py -> build/bdist.linux-x86_64/wheel/./allauth/account/migrations copying build/lib/allauth/account/migrations/0005_emailaddress_idx_upper_email.py -> build/bdist.linux-x86_64/wheel/./allauth/account/migrations copying build/lib/allauth/account/migrations/0006_emailaddress_lower.py -> build/bdist.linux-x86_64/wheel/./allauth/account/migrations copying build/lib/allauth/account/migrations/0007_emailaddress_idx_email.py -> build/bdist.linux-x86_64/wheel/./allauth/account/migrations copying build/lib/allauth/account/migrations/0008_emailaddress_unique_primary_email_fixup.py -> build/bdist.linux-x86_64/wheel/./allauth/account/migrations copying build/lib/allauth/account/migrations/0009_emailaddress_unique_primary_email.py -> build/bdist.linux-x86_64/wheel/./allauth/account/migrations copying build/lib/allauth/account/migrations/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/account/migrations creating build/bdist.linux-x86_64/wheel/allauth/account/templatetags copying build/lib/allauth/account/templatetags/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/account/templatetags copying build/lib/allauth/account/templatetags/account.py -> build/bdist.linux-x86_64/wheel/./allauth/account/templatetags creating build/bdist.linux-x86_64/wheel/allauth/account/tests copying build/lib/allauth/account/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_adapter.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_ajax.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_auth_backends.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_change_email.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_change_password.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_commands.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_decorators.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_email_verification.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_email_verification_by_code.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_login.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_login_by_code.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_logout.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_middleware.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_models.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_ratelimit.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_reauthentication.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_reset_password.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_security.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_signup.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/tests/test_utils.py -> build/bdist.linux-x86_64/wheel/./allauth/account/tests copying build/lib/allauth/account/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/adapter.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/admin.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/app_settings.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/apps.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/auth_backends.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/authentication.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/checks.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/decorators.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/forms.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/managers.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/middleware.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/mixins.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/models.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/reauthentication.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/signals.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/stages.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/utils.py -> build/bdist.linux-x86_64/wheel/./allauth/account copying build/lib/allauth/account/views.py -> build/bdist.linux-x86_64/wheel/./allauth/account creating build/bdist.linux-x86_64/wheel/allauth/core creating build/bdist.linux-x86_64/wheel/allauth/core/internal creating build/bdist.linux-x86_64/wheel/allauth/core/internal/tests copying build/lib/allauth/core/internal/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/core/internal/tests copying build/lib/allauth/core/internal/tests/test_httpkit.py -> build/bdist.linux-x86_64/wheel/./allauth/core/internal/tests copying build/lib/allauth/core/internal/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/core/internal copying build/lib/allauth/core/internal/adapter.py -> build/bdist.linux-x86_64/wheel/./allauth/core/internal copying build/lib/allauth/core/internal/httpkit.py -> build/bdist.linux-x86_64/wheel/./allauth/core/internal creating build/bdist.linux-x86_64/wheel/allauth/core/tests copying build/lib/allauth/core/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/core/tests copying build/lib/allauth/core/tests/test_ratelimit.py -> build/bdist.linux-x86_64/wheel/./allauth/core/tests copying build/lib/allauth/core/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/core copying build/lib/allauth/core/context.py -> build/bdist.linux-x86_64/wheel/./allauth/core copying build/lib/allauth/core/exceptions.py -> build/bdist.linux-x86_64/wheel/./allauth/core copying build/lib/allauth/core/ratelimit.py -> build/bdist.linux-x86_64/wheel/./allauth/core creating build/bdist.linux-x86_64/wheel/allauth/headless creating build/bdist.linux-x86_64/wheel/allauth/headless/account creating build/bdist.linux-x86_64/wheel/allauth/headless/account/tests copying build/lib/allauth/headless/account/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account/tests copying build/lib/allauth/headless/account/tests/test_change_email.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account/tests copying build/lib/allauth/headless/account/tests/test_change_password.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account/tests copying build/lib/allauth/headless/account/tests/test_email_verification.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account/tests copying build/lib/allauth/headless/account/tests/test_email_verification_by_code.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account/tests copying build/lib/allauth/headless/account/tests/test_login.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account/tests copying build/lib/allauth/headless/account/tests/test_login_by_code.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account/tests copying build/lib/allauth/headless/account/tests/test_reauthentication.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account/tests copying build/lib/allauth/headless/account/tests/test_reset_password.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account/tests copying build/lib/allauth/headless/account/tests/test_session.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account/tests copying build/lib/allauth/headless/account/tests/test_signup.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account/tests copying build/lib/allauth/headless/account/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account copying build/lib/allauth/headless/account/inputs.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account copying build/lib/allauth/headless/account/response.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account copying build/lib/allauth/headless/account/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account copying build/lib/allauth/headless/account/views.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/account creating build/bdist.linux-x86_64/wheel/allauth/headless/base creating build/bdist.linux-x86_64/wheel/allauth/headless/base/tests copying build/lib/allauth/headless/base/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/base/tests copying build/lib/allauth/headless/base/tests/test_views.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/base/tests copying build/lib/allauth/headless/base/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/base copying build/lib/allauth/headless/base/response.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/base copying build/lib/allauth/headless/base/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/base copying build/lib/allauth/headless/base/views.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/base creating build/bdist.linux-x86_64/wheel/allauth/headless/internal creating build/bdist.linux-x86_64/wheel/allauth/headless/internal/restkit copying build/lib/allauth/headless/internal/restkit/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/internal/restkit copying build/lib/allauth/headless/internal/restkit/inputs.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/internal/restkit copying build/lib/allauth/headless/internal/restkit/response.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/internal/restkit copying build/lib/allauth/headless/internal/restkit/views.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/internal/restkit creating build/bdist.linux-x86_64/wheel/allauth/headless/internal/tests copying build/lib/allauth/headless/internal/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/internal/tests copying build/lib/allauth/headless/internal/tests/test_authkit.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/internal/tests copying build/lib/allauth/headless/internal/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/internal copying build/lib/allauth/headless/internal/authkit.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/internal copying build/lib/allauth/headless/internal/decorators.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/internal copying build/lib/allauth/headless/internal/sessionkit.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/internal creating build/bdist.linux-x86_64/wheel/allauth/headless/mfa creating build/bdist.linux-x86_64/wheel/allauth/headless/mfa/tests copying build/lib/allauth/headless/mfa/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/mfa/tests copying build/lib/allauth/headless/mfa/tests/test_recovery_codes.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/mfa/tests copying build/lib/allauth/headless/mfa/tests/test_totp.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/mfa/tests copying build/lib/allauth/headless/mfa/tests/test_views.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/mfa/tests copying build/lib/allauth/headless/mfa/tests/test_webauthn.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/mfa/tests copying build/lib/allauth/headless/mfa/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/mfa copying build/lib/allauth/headless/mfa/inputs.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/mfa copying build/lib/allauth/headless/mfa/response.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/mfa copying build/lib/allauth/headless/mfa/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/mfa copying build/lib/allauth/headless/mfa/views.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/mfa creating build/bdist.linux-x86_64/wheel/allauth/headless/socialaccount creating build/bdist.linux-x86_64/wheel/allauth/headless/socialaccount/tests copying build/lib/allauth/headless/socialaccount/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/socialaccount/tests copying build/lib/allauth/headless/socialaccount/tests/test_inputs.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/socialaccount/tests copying build/lib/allauth/headless/socialaccount/tests/test_views.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/socialaccount/tests copying build/lib/allauth/headless/socialaccount/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/socialaccount copying build/lib/allauth/headless/socialaccount/forms.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/socialaccount copying build/lib/allauth/headless/socialaccount/inputs.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/socialaccount copying build/lib/allauth/headless/socialaccount/internal.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/socialaccount copying build/lib/allauth/headless/socialaccount/response.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/socialaccount copying build/lib/allauth/headless/socialaccount/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/socialaccount copying build/lib/allauth/headless/socialaccount/views.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/socialaccount creating build/bdist.linux-x86_64/wheel/allauth/headless/tests copying build/lib/allauth/headless/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/tests copying build/lib/allauth/headless/tests/test_tokens.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/tests creating build/bdist.linux-x86_64/wheel/allauth/headless/tokens copying build/lib/allauth/headless/tokens/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/tokens copying build/lib/allauth/headless/tokens/base.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/tokens copying build/lib/allauth/headless/tokens/sessions.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/tokens creating build/bdist.linux-x86_64/wheel/allauth/headless/usersessions creating build/bdist.linux-x86_64/wheel/allauth/headless/usersessions/tests copying build/lib/allauth/headless/usersessions/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/usersessions/tests copying build/lib/allauth/headless/usersessions/tests/test_views.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/usersessions/tests copying build/lib/allauth/headless/usersessions/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/usersessions copying build/lib/allauth/headless/usersessions/inputs.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/usersessions copying build/lib/allauth/headless/usersessions/response.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/usersessions copying build/lib/allauth/headless/usersessions/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/usersessions copying build/lib/allauth/headless/usersessions/views.py -> build/bdist.linux-x86_64/wheel/./allauth/headless/usersessions copying build/lib/allauth/headless/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/headless copying build/lib/allauth/headless/adapter.py -> build/bdist.linux-x86_64/wheel/./allauth/headless copying build/lib/allauth/headless/app_settings.py -> build/bdist.linux-x86_64/wheel/./allauth/headless copying build/lib/allauth/headless/apps.py -> build/bdist.linux-x86_64/wheel/./allauth/headless copying build/lib/allauth/headless/conftest.py -> build/bdist.linux-x86_64/wheel/./allauth/headless copying build/lib/allauth/headless/constants.py -> build/bdist.linux-x86_64/wheel/./allauth/headless copying build/lib/allauth/headless/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/headless creating build/bdist.linux-x86_64/wheel/allauth/mfa creating build/bdist.linux-x86_64/wheel/allauth/mfa/static creating build/bdist.linux-x86_64/wheel/allauth/mfa/static/mfa creating build/bdist.linux-x86_64/wheel/allauth/mfa/static/mfa/js copying build/lib/allauth/mfa/static/mfa/js/webauthn.js -> build/bdist.linux-x86_64/wheel/./allauth/mfa/static/mfa/js copying build/lib/allauth/mfa/static/mfa/js/webauthn-json.js -> build/bdist.linux-x86_64/wheel/./allauth/mfa/static/mfa/js creating build/bdist.linux-x86_64/wheel/allauth/mfa/base creating build/bdist.linux-x86_64/wheel/allauth/mfa/base/internal copying build/lib/allauth/mfa/base/internal/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/base/internal copying build/lib/allauth/mfa/base/internal/flows.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/base/internal creating build/bdist.linux-x86_64/wheel/allauth/mfa/base/tests copying build/lib/allauth/mfa/base/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/base/tests copying build/lib/allauth/mfa/base/tests/test_views.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/base/tests copying build/lib/allauth/mfa/base/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/base copying build/lib/allauth/mfa/base/forms.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/base copying build/lib/allauth/mfa/base/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/base copying build/lib/allauth/mfa/base/views.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/base creating build/bdist.linux-x86_64/wheel/allauth/mfa/internal creating build/bdist.linux-x86_64/wheel/allauth/mfa/internal/flows copying build/lib/allauth/mfa/internal/flows/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/internal/flows copying build/lib/allauth/mfa/internal/flows/add.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/internal/flows copying build/lib/allauth/mfa/internal/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/internal creating build/bdist.linux-x86_64/wheel/allauth/mfa/migrations copying build/lib/allauth/mfa/migrations/0001_initial.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/migrations copying build/lib/allauth/mfa/migrations/0002_authenticator_timestamps.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/migrations copying build/lib/allauth/mfa/migrations/0003_authenticator_type_uniq.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/migrations copying build/lib/allauth/mfa/migrations/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/migrations creating build/bdist.linux-x86_64/wheel/allauth/mfa/recovery_codes creating build/bdist.linux-x86_64/wheel/allauth/mfa/recovery_codes/internal copying build/lib/allauth/mfa/recovery_codes/internal/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/recovery_codes/internal copying build/lib/allauth/mfa/recovery_codes/internal/auth.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/recovery_codes/internal copying build/lib/allauth/mfa/recovery_codes/internal/flows.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/recovery_codes/internal creating build/bdist.linux-x86_64/wheel/allauth/mfa/recovery_codes/tests copying build/lib/allauth/mfa/recovery_codes/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/recovery_codes/tests copying build/lib/allauth/mfa/recovery_codes/tests/test_auth.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/recovery_codes/tests copying build/lib/allauth/mfa/recovery_codes/tests/test_views.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/recovery_codes/tests copying build/lib/allauth/mfa/recovery_codes/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/recovery_codes copying build/lib/allauth/mfa/recovery_codes/forms.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/recovery_codes copying build/lib/allauth/mfa/recovery_codes/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/recovery_codes copying build/lib/allauth/mfa/recovery_codes/views.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/recovery_codes creating build/bdist.linux-x86_64/wheel/allauth/mfa/totp creating build/bdist.linux-x86_64/wheel/allauth/mfa/totp/internal copying build/lib/allauth/mfa/totp/internal/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/totp/internal copying build/lib/allauth/mfa/totp/internal/auth.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/totp/internal copying build/lib/allauth/mfa/totp/internal/flows.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/totp/internal creating build/bdist.linux-x86_64/wheel/allauth/mfa/totp/tests copying build/lib/allauth/mfa/totp/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/totp/tests copying build/lib/allauth/mfa/totp/tests/test_unit.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/totp/tests copying build/lib/allauth/mfa/totp/tests/test_views.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/totp/tests copying build/lib/allauth/mfa/totp/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/totp copying build/lib/allauth/mfa/totp/forms.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/totp copying build/lib/allauth/mfa/totp/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/totp copying build/lib/allauth/mfa/totp/views.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/totp creating build/bdist.linux-x86_64/wheel/allauth/mfa/webauthn creating build/bdist.linux-x86_64/wheel/allauth/mfa/webauthn/internal copying build/lib/allauth/mfa/webauthn/internal/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/webauthn/internal copying build/lib/allauth/mfa/webauthn/internal/auth.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/webauthn/internal copying build/lib/allauth/mfa/webauthn/internal/flows.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/webauthn/internal creating build/bdist.linux-x86_64/wheel/allauth/mfa/webauthn/tests copying build/lib/allauth/mfa/webauthn/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/webauthn/tests copying build/lib/allauth/mfa/webauthn/tests/test_views.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/webauthn/tests copying build/lib/allauth/mfa/webauthn/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/webauthn copying build/lib/allauth/mfa/webauthn/forms.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/webauthn copying build/lib/allauth/mfa/webauthn/stages.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/webauthn copying build/lib/allauth/mfa/webauthn/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/webauthn copying build/lib/allauth/mfa/webauthn/views.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa/webauthn copying build/lib/allauth/mfa/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa copying build/lib/allauth/mfa/adapter.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa copying build/lib/allauth/mfa/admin.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa copying build/lib/allauth/mfa/app_settings.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa copying build/lib/allauth/mfa/apps.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa copying build/lib/allauth/mfa/checks.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa copying build/lib/allauth/mfa/models.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa copying build/lib/allauth/mfa/signals.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa copying build/lib/allauth/mfa/stages.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa copying build/lib/allauth/mfa/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa copying build/lib/allauth/mfa/utils.py -> build/bdist.linux-x86_64/wheel/./allauth/mfa creating build/bdist.linux-x86_64/wheel/allauth/socialaccount creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/internal creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/internal/flows copying build/lib/allauth/socialaccount/internal/flows/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/internal/flows copying build/lib/allauth/socialaccount/internal/flows/connect.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/internal/flows copying build/lib/allauth/socialaccount/internal/flows/email_authentication.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/internal/flows copying build/lib/allauth/socialaccount/internal/flows/login.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/internal/flows copying build/lib/allauth/socialaccount/internal/flows/signup.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/internal/flows creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/internal/tests copying build/lib/allauth/socialaccount/internal/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/internal/tests copying build/lib/allauth/socialaccount/internal/tests/test_jwtkit.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/internal/tests copying build/lib/allauth/socialaccount/internal/tests/test_statekit.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/internal/tests copying build/lib/allauth/socialaccount/internal/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/internal copying build/lib/allauth/socialaccount/internal/jwtkit.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/internal copying build/lib/allauth/socialaccount/internal/statekit.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/internal creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/migrations copying build/lib/allauth/socialaccount/migrations/0001_initial.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/migrations copying build/lib/allauth/socialaccount/migrations/0002_token_max_lengths.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/migrations copying build/lib/allauth/socialaccount/migrations/0003_extra_data_default_dict.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/migrations copying build/lib/allauth/socialaccount/migrations/0004_app_provider_id_settings.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/migrations copying build/lib/allauth/socialaccount/migrations/0005_socialtoken_nullable_app.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/migrations copying build/lib/allauth/socialaccount/migrations/0006_alter_socialaccount_extra_data.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/migrations copying build/lib/allauth/socialaccount/migrations/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/migrations creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/agave copying build/lib/allauth/socialaccount/providers/agave/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/agave copying build/lib/allauth/socialaccount/providers/agave/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/agave copying build/lib/allauth/socialaccount/providers/agave/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/agave copying build/lib/allauth/socialaccount/providers/agave/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/agave copying build/lib/allauth/socialaccount/providers/agave/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/agave creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/amazon copying build/lib/allauth/socialaccount/providers/amazon/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/amazon copying build/lib/allauth/socialaccount/providers/amazon/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/amazon copying build/lib/allauth/socialaccount/providers/amazon/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/amazon copying build/lib/allauth/socialaccount/providers/amazon/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/amazon copying build/lib/allauth/socialaccount/providers/amazon/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/amazon creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/amazon_cognito copying build/lib/allauth/socialaccount/providers/amazon_cognito/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/amazon_cognito copying build/lib/allauth/socialaccount/providers/amazon_cognito/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/amazon_cognito copying build/lib/allauth/socialaccount/providers/amazon_cognito/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/amazon_cognito copying build/lib/allauth/socialaccount/providers/amazon_cognito/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/amazon_cognito copying build/lib/allauth/socialaccount/providers/amazon_cognito/utils.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/amazon_cognito copying build/lib/allauth/socialaccount/providers/amazon_cognito/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/amazon_cognito creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/angellist copying build/lib/allauth/socialaccount/providers/angellist/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/angellist copying build/lib/allauth/socialaccount/providers/angellist/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/angellist copying build/lib/allauth/socialaccount/providers/angellist/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/angellist copying build/lib/allauth/socialaccount/providers/angellist/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/angellist copying build/lib/allauth/socialaccount/providers/angellist/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/angellist creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/apple copying build/lib/allauth/socialaccount/providers/apple/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/apple copying build/lib/allauth/socialaccount/providers/apple/apple_session.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/apple copying build/lib/allauth/socialaccount/providers/apple/client.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/apple copying build/lib/allauth/socialaccount/providers/apple/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/apple copying build/lib/allauth/socialaccount/providers/apple/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/apple copying build/lib/allauth/socialaccount/providers/apple/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/apple copying build/lib/allauth/socialaccount/providers/apple/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/apple creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/asana copying build/lib/allauth/socialaccount/providers/asana/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/asana copying build/lib/allauth/socialaccount/providers/asana/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/asana copying build/lib/allauth/socialaccount/providers/asana/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/asana copying build/lib/allauth/socialaccount/providers/asana/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/asana copying build/lib/allauth/socialaccount/providers/asana/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/asana copying build/lib/allauth/socialaccount/providers/asana/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/asana creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/atlassian copying build/lib/allauth/socialaccount/providers/atlassian/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/atlassian copying build/lib/allauth/socialaccount/providers/atlassian/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/atlassian copying build/lib/allauth/socialaccount/providers/atlassian/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/atlassian copying build/lib/allauth/socialaccount/providers/atlassian/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/atlassian copying build/lib/allauth/socialaccount/providers/atlassian/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/atlassian creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/auth0 copying build/lib/allauth/socialaccount/providers/auth0/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/auth0 copying build/lib/allauth/socialaccount/providers/auth0/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/auth0 copying build/lib/allauth/socialaccount/providers/auth0/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/auth0 copying build/lib/allauth/socialaccount/providers/auth0/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/auth0 copying build/lib/allauth/socialaccount/providers/auth0/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/auth0 creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/authentiq copying build/lib/allauth/socialaccount/providers/authentiq/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/authentiq copying build/lib/allauth/socialaccount/providers/authentiq/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/authentiq copying build/lib/allauth/socialaccount/providers/authentiq/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/authentiq copying build/lib/allauth/socialaccount/providers/authentiq/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/authentiq copying build/lib/allauth/socialaccount/providers/authentiq/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/authentiq creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/baidu copying build/lib/allauth/socialaccount/providers/baidu/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/baidu copying build/lib/allauth/socialaccount/providers/baidu/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/baidu copying build/lib/allauth/socialaccount/providers/baidu/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/baidu copying build/lib/allauth/socialaccount/providers/baidu/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/baidu copying build/lib/allauth/socialaccount/providers/baidu/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/baidu creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/base copying build/lib/allauth/socialaccount/providers/base/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/base copying build/lib/allauth/socialaccount/providers/base/constants.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/base copying build/lib/allauth/socialaccount/providers/base/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/base copying build/lib/allauth/socialaccount/providers/base/utils.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/base copying build/lib/allauth/socialaccount/providers/base/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/base creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/basecamp copying build/lib/allauth/socialaccount/providers/basecamp/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/basecamp copying build/lib/allauth/socialaccount/providers/basecamp/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/basecamp copying build/lib/allauth/socialaccount/providers/basecamp/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/basecamp copying build/lib/allauth/socialaccount/providers/basecamp/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/basecamp copying build/lib/allauth/socialaccount/providers/basecamp/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/basecamp creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/battlenet copying build/lib/allauth/socialaccount/providers/battlenet/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/battlenet copying build/lib/allauth/socialaccount/providers/battlenet/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/battlenet copying build/lib/allauth/socialaccount/providers/battlenet/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/battlenet copying build/lib/allauth/socialaccount/providers/battlenet/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/battlenet copying build/lib/allauth/socialaccount/providers/battlenet/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/battlenet copying build/lib/allauth/socialaccount/providers/battlenet/validators.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/battlenet copying build/lib/allauth/socialaccount/providers/battlenet/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/battlenet creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/bitbucket_oauth2 copying build/lib/allauth/socialaccount/providers/bitbucket_oauth2/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/bitbucket_oauth2 copying build/lib/allauth/socialaccount/providers/bitbucket_oauth2/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/bitbucket_oauth2 copying build/lib/allauth/socialaccount/providers/bitbucket_oauth2/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/bitbucket_oauth2 copying build/lib/allauth/socialaccount/providers/bitbucket_oauth2/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/bitbucket_oauth2 copying build/lib/allauth/socialaccount/providers/bitbucket_oauth2/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/bitbucket_oauth2 creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/bitly copying build/lib/allauth/socialaccount/providers/bitly/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/bitly copying build/lib/allauth/socialaccount/providers/bitly/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/bitly copying build/lib/allauth/socialaccount/providers/bitly/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/bitly copying build/lib/allauth/socialaccount/providers/bitly/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/bitly copying build/lib/allauth/socialaccount/providers/bitly/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/bitly creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/box copying build/lib/allauth/socialaccount/providers/box/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/box copying build/lib/allauth/socialaccount/providers/box/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/box copying build/lib/allauth/socialaccount/providers/box/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/box copying build/lib/allauth/socialaccount/providers/box/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/box copying build/lib/allauth/socialaccount/providers/box/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/box creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/cilogon copying build/lib/allauth/socialaccount/providers/cilogon/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/cilogon copying build/lib/allauth/socialaccount/providers/cilogon/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/cilogon copying build/lib/allauth/socialaccount/providers/cilogon/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/cilogon copying build/lib/allauth/socialaccount/providers/cilogon/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/cilogon copying build/lib/allauth/socialaccount/providers/cilogon/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/cilogon creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/clever copying build/lib/allauth/socialaccount/providers/clever/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/clever copying build/lib/allauth/socialaccount/providers/clever/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/clever copying build/lib/allauth/socialaccount/providers/clever/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/clever copying build/lib/allauth/socialaccount/providers/clever/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/clever copying build/lib/allauth/socialaccount/providers/clever/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/clever creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/coinbase copying build/lib/allauth/socialaccount/providers/coinbase/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/coinbase copying build/lib/allauth/socialaccount/providers/coinbase/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/coinbase copying build/lib/allauth/socialaccount/providers/coinbase/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/coinbase copying build/lib/allauth/socialaccount/providers/coinbase/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/coinbase copying build/lib/allauth/socialaccount/providers/coinbase/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/coinbase creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/dataporten copying build/lib/allauth/socialaccount/providers/dataporten/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dataporten copying build/lib/allauth/socialaccount/providers/dataporten/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dataporten copying build/lib/allauth/socialaccount/providers/dataporten/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dataporten copying build/lib/allauth/socialaccount/providers/dataporten/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dataporten copying build/lib/allauth/socialaccount/providers/dataporten/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dataporten copying build/lib/allauth/socialaccount/providers/dataporten/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dataporten creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/daum copying build/lib/allauth/socialaccount/providers/daum/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/daum copying build/lib/allauth/socialaccount/providers/daum/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/daum copying build/lib/allauth/socialaccount/providers/daum/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/daum copying build/lib/allauth/socialaccount/providers/daum/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/daum copying build/lib/allauth/socialaccount/providers/daum/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/daum copying build/lib/allauth/socialaccount/providers/daum/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/daum creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/digitalocean copying build/lib/allauth/socialaccount/providers/digitalocean/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/digitalocean copying build/lib/allauth/socialaccount/providers/digitalocean/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/digitalocean copying build/lib/allauth/socialaccount/providers/digitalocean/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/digitalocean copying build/lib/allauth/socialaccount/providers/digitalocean/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/digitalocean copying build/lib/allauth/socialaccount/providers/digitalocean/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/digitalocean creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/dingtalk copying build/lib/allauth/socialaccount/providers/dingtalk/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dingtalk copying build/lib/allauth/socialaccount/providers/dingtalk/client.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dingtalk copying build/lib/allauth/socialaccount/providers/dingtalk/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dingtalk copying build/lib/allauth/socialaccount/providers/dingtalk/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dingtalk copying build/lib/allauth/socialaccount/providers/dingtalk/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dingtalk copying build/lib/allauth/socialaccount/providers/dingtalk/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dingtalk creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/discord copying build/lib/allauth/socialaccount/providers/discord/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/discord copying build/lib/allauth/socialaccount/providers/discord/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/discord copying build/lib/allauth/socialaccount/providers/discord/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/discord copying build/lib/allauth/socialaccount/providers/discord/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/discord copying build/lib/allauth/socialaccount/providers/discord/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/discord creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/disqus copying build/lib/allauth/socialaccount/providers/disqus/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/disqus copying build/lib/allauth/socialaccount/providers/disqus/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/disqus copying build/lib/allauth/socialaccount/providers/disqus/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/disqus copying build/lib/allauth/socialaccount/providers/disqus/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/disqus copying build/lib/allauth/socialaccount/providers/disqus/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/disqus creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/douban copying build/lib/allauth/socialaccount/providers/douban/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/douban copying build/lib/allauth/socialaccount/providers/douban/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/douban copying build/lib/allauth/socialaccount/providers/douban/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/douban copying build/lib/allauth/socialaccount/providers/douban/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/douban copying build/lib/allauth/socialaccount/providers/douban/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/douban creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/doximity copying build/lib/allauth/socialaccount/providers/doximity/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/doximity copying build/lib/allauth/socialaccount/providers/doximity/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/doximity copying build/lib/allauth/socialaccount/providers/doximity/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/doximity copying build/lib/allauth/socialaccount/providers/doximity/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/doximity copying build/lib/allauth/socialaccount/providers/doximity/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/doximity creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/draugiem copying build/lib/allauth/socialaccount/providers/draugiem/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/draugiem copying build/lib/allauth/socialaccount/providers/draugiem/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/draugiem copying build/lib/allauth/socialaccount/providers/draugiem/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/draugiem copying build/lib/allauth/socialaccount/providers/draugiem/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/draugiem copying build/lib/allauth/socialaccount/providers/draugiem/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/draugiem creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/drip copying build/lib/allauth/socialaccount/providers/drip/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/drip copying build/lib/allauth/socialaccount/providers/drip/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/drip copying build/lib/allauth/socialaccount/providers/drip/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/drip copying build/lib/allauth/socialaccount/providers/drip/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/drip copying build/lib/allauth/socialaccount/providers/drip/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/drip creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/dropbox copying build/lib/allauth/socialaccount/providers/dropbox/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dropbox copying build/lib/allauth/socialaccount/providers/dropbox/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dropbox copying build/lib/allauth/socialaccount/providers/dropbox/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dropbox copying build/lib/allauth/socialaccount/providers/dropbox/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dropbox copying build/lib/allauth/socialaccount/providers/dropbox/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dropbox creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/dummy creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/dummy/templates creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/dummy/templates/dummy copying build/lib/allauth/socialaccount/providers/dummy/templates/dummy/authenticate_form.html -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dummy/templates/dummy copying build/lib/allauth/socialaccount/providers/dummy/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dummy copying build/lib/allauth/socialaccount/providers/dummy/forms.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dummy copying build/lib/allauth/socialaccount/providers/dummy/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dummy copying build/lib/allauth/socialaccount/providers/dummy/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dummy copying build/lib/allauth/socialaccount/providers/dummy/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dummy copying build/lib/allauth/socialaccount/providers/dummy/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dummy creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/dwolla copying build/lib/allauth/socialaccount/providers/dwolla/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dwolla copying build/lib/allauth/socialaccount/providers/dwolla/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dwolla copying build/lib/allauth/socialaccount/providers/dwolla/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dwolla copying build/lib/allauth/socialaccount/providers/dwolla/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dwolla copying build/lib/allauth/socialaccount/providers/dwolla/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dwolla copying build/lib/allauth/socialaccount/providers/dwolla/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/dwolla creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/edmodo copying build/lib/allauth/socialaccount/providers/edmodo/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/edmodo copying build/lib/allauth/socialaccount/providers/edmodo/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/edmodo copying build/lib/allauth/socialaccount/providers/edmodo/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/edmodo copying build/lib/allauth/socialaccount/providers/edmodo/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/edmodo copying build/lib/allauth/socialaccount/providers/edmodo/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/edmodo creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/edx copying build/lib/allauth/socialaccount/providers/edx/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/edx copying build/lib/allauth/socialaccount/providers/edx/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/edx copying build/lib/allauth/socialaccount/providers/edx/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/edx copying build/lib/allauth/socialaccount/providers/edx/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/edx copying build/lib/allauth/socialaccount/providers/edx/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/edx creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/eventbrite copying build/lib/allauth/socialaccount/providers/eventbrite/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/eventbrite copying build/lib/allauth/socialaccount/providers/eventbrite/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/eventbrite copying build/lib/allauth/socialaccount/providers/eventbrite/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/eventbrite copying build/lib/allauth/socialaccount/providers/eventbrite/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/eventbrite copying build/lib/allauth/socialaccount/providers/eventbrite/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/eventbrite creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/eveonline copying build/lib/allauth/socialaccount/providers/eveonline/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/eveonline copying build/lib/allauth/socialaccount/providers/eveonline/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/eveonline copying build/lib/allauth/socialaccount/providers/eveonline/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/eveonline copying build/lib/allauth/socialaccount/providers/eveonline/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/eveonline copying build/lib/allauth/socialaccount/providers/eveonline/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/eveonline creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/evernote copying build/lib/allauth/socialaccount/providers/evernote/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/evernote copying build/lib/allauth/socialaccount/providers/evernote/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/evernote copying build/lib/allauth/socialaccount/providers/evernote/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/evernote copying build/lib/allauth/socialaccount/providers/evernote/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/evernote copying build/lib/allauth/socialaccount/providers/evernote/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/evernote creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/exist copying build/lib/allauth/socialaccount/providers/exist/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/exist copying build/lib/allauth/socialaccount/providers/exist/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/exist copying build/lib/allauth/socialaccount/providers/exist/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/exist copying build/lib/allauth/socialaccount/providers/exist/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/exist copying build/lib/allauth/socialaccount/providers/exist/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/exist creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/facebook creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/facebook/templates creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/facebook/templates/facebook copying build/lib/allauth/socialaccount/providers/facebook/templates/facebook/fbconnect.html -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/facebook/templates/facebook creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/facebook/static creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/facebook/static/facebook creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/facebook/static/facebook/js copying build/lib/allauth/socialaccount/providers/facebook/static/facebook/js/fbconnect.js -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/facebook/static/facebook/js creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/facebook/data copying build/lib/allauth/socialaccount/providers/facebook/data/FacebookLocales.xml -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/facebook/data copying build/lib/allauth/socialaccount/providers/facebook/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/facebook copying build/lib/allauth/socialaccount/providers/facebook/constants.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/facebook copying build/lib/allauth/socialaccount/providers/facebook/flows.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/facebook copying build/lib/allauth/socialaccount/providers/facebook/forms.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/facebook copying build/lib/allauth/socialaccount/providers/facebook/locale.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/facebook copying build/lib/allauth/socialaccount/providers/facebook/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/facebook copying build/lib/allauth/socialaccount/providers/facebook/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/facebook copying build/lib/allauth/socialaccount/providers/facebook/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/facebook copying build/lib/allauth/socialaccount/providers/facebook/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/facebook creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/feedly copying build/lib/allauth/socialaccount/providers/feedly/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/feedly copying build/lib/allauth/socialaccount/providers/feedly/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/feedly copying build/lib/allauth/socialaccount/providers/feedly/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/feedly copying build/lib/allauth/socialaccount/providers/feedly/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/feedly copying build/lib/allauth/socialaccount/providers/feedly/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/feedly creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/feishu copying build/lib/allauth/socialaccount/providers/feishu/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/feishu copying build/lib/allauth/socialaccount/providers/feishu/client.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/feishu copying build/lib/allauth/socialaccount/providers/feishu/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/feishu copying build/lib/allauth/socialaccount/providers/feishu/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/feishu copying build/lib/allauth/socialaccount/providers/feishu/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/feishu copying build/lib/allauth/socialaccount/providers/feishu/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/feishu creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/figma copying build/lib/allauth/socialaccount/providers/figma/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/figma copying build/lib/allauth/socialaccount/providers/figma/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/figma copying build/lib/allauth/socialaccount/providers/figma/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/figma copying build/lib/allauth/socialaccount/providers/figma/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/figma copying build/lib/allauth/socialaccount/providers/figma/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/figma creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/fivehundredpx copying build/lib/allauth/socialaccount/providers/fivehundredpx/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/fivehundredpx copying build/lib/allauth/socialaccount/providers/fivehundredpx/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/fivehundredpx copying build/lib/allauth/socialaccount/providers/fivehundredpx/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/fivehundredpx copying build/lib/allauth/socialaccount/providers/fivehundredpx/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/fivehundredpx copying build/lib/allauth/socialaccount/providers/fivehundredpx/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/fivehundredpx copying build/lib/allauth/socialaccount/providers/fivehundredpx/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/fivehundredpx creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/flickr copying build/lib/allauth/socialaccount/providers/flickr/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/flickr copying build/lib/allauth/socialaccount/providers/flickr/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/flickr copying build/lib/allauth/socialaccount/providers/flickr/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/flickr copying build/lib/allauth/socialaccount/providers/flickr/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/flickr copying build/lib/allauth/socialaccount/providers/flickr/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/flickr creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/foursquare copying build/lib/allauth/socialaccount/providers/foursquare/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/foursquare copying build/lib/allauth/socialaccount/providers/foursquare/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/foursquare copying build/lib/allauth/socialaccount/providers/foursquare/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/foursquare copying build/lib/allauth/socialaccount/providers/foursquare/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/foursquare copying build/lib/allauth/socialaccount/providers/foursquare/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/foursquare creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/frontier copying build/lib/allauth/socialaccount/providers/frontier/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/frontier copying build/lib/allauth/socialaccount/providers/frontier/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/frontier copying build/lib/allauth/socialaccount/providers/frontier/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/frontier copying build/lib/allauth/socialaccount/providers/frontier/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/frontier copying build/lib/allauth/socialaccount/providers/frontier/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/frontier creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/fxa copying build/lib/allauth/socialaccount/providers/fxa/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/fxa copying build/lib/allauth/socialaccount/providers/fxa/constants.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/fxa copying build/lib/allauth/socialaccount/providers/fxa/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/fxa copying build/lib/allauth/socialaccount/providers/fxa/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/fxa copying build/lib/allauth/socialaccount/providers/fxa/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/fxa copying build/lib/allauth/socialaccount/providers/fxa/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/fxa copying build/lib/allauth/socialaccount/providers/fxa/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/fxa creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/gitea copying build/lib/allauth/socialaccount/providers/gitea/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/gitea copying build/lib/allauth/socialaccount/providers/gitea/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/gitea copying build/lib/allauth/socialaccount/providers/gitea/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/gitea copying build/lib/allauth/socialaccount/providers/gitea/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/gitea copying build/lib/allauth/socialaccount/providers/gitea/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/gitea creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/github copying build/lib/allauth/socialaccount/providers/github/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/github copying build/lib/allauth/socialaccount/providers/github/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/github copying build/lib/allauth/socialaccount/providers/github/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/github copying build/lib/allauth/socialaccount/providers/github/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/github copying build/lib/allauth/socialaccount/providers/github/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/github creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/gitlab copying build/lib/allauth/socialaccount/providers/gitlab/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/gitlab copying build/lib/allauth/socialaccount/providers/gitlab/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/gitlab copying build/lib/allauth/socialaccount/providers/gitlab/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/gitlab copying build/lib/allauth/socialaccount/providers/gitlab/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/gitlab copying build/lib/allauth/socialaccount/providers/gitlab/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/gitlab creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/globus copying build/lib/allauth/socialaccount/providers/globus/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/globus copying build/lib/allauth/socialaccount/providers/globus/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/globus copying build/lib/allauth/socialaccount/providers/globus/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/globus copying build/lib/allauth/socialaccount/providers/globus/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/globus copying build/lib/allauth/socialaccount/providers/globus/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/globus creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/google copying build/lib/allauth/socialaccount/providers/google/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/google copying build/lib/allauth/socialaccount/providers/google/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/google copying build/lib/allauth/socialaccount/providers/google/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/google copying build/lib/allauth/socialaccount/providers/google/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/google copying build/lib/allauth/socialaccount/providers/google/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/google creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/gumroad copying build/lib/allauth/socialaccount/providers/gumroad/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/gumroad copying build/lib/allauth/socialaccount/providers/gumroad/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/gumroad copying build/lib/allauth/socialaccount/providers/gumroad/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/gumroad copying build/lib/allauth/socialaccount/providers/gumroad/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/gumroad copying build/lib/allauth/socialaccount/providers/gumroad/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/gumroad creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/hubic copying build/lib/allauth/socialaccount/providers/hubic/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/hubic copying build/lib/allauth/socialaccount/providers/hubic/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/hubic copying build/lib/allauth/socialaccount/providers/hubic/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/hubic copying build/lib/allauth/socialaccount/providers/hubic/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/hubic copying build/lib/allauth/socialaccount/providers/hubic/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/hubic creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/hubspot copying build/lib/allauth/socialaccount/providers/hubspot/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/hubspot copying build/lib/allauth/socialaccount/providers/hubspot/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/hubspot copying build/lib/allauth/socialaccount/providers/hubspot/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/hubspot copying build/lib/allauth/socialaccount/providers/hubspot/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/hubspot copying build/lib/allauth/socialaccount/providers/hubspot/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/hubspot creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/instagram copying build/lib/allauth/socialaccount/providers/instagram/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/instagram copying build/lib/allauth/socialaccount/providers/instagram/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/instagram copying build/lib/allauth/socialaccount/providers/instagram/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/instagram copying build/lib/allauth/socialaccount/providers/instagram/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/instagram copying build/lib/allauth/socialaccount/providers/instagram/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/instagram creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/jupyterhub copying build/lib/allauth/socialaccount/providers/jupyterhub/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/jupyterhub copying build/lib/allauth/socialaccount/providers/jupyterhub/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/jupyterhub copying build/lib/allauth/socialaccount/providers/jupyterhub/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/jupyterhub copying build/lib/allauth/socialaccount/providers/jupyterhub/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/jupyterhub copying build/lib/allauth/socialaccount/providers/jupyterhub/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/jupyterhub creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/kakao copying build/lib/allauth/socialaccount/providers/kakao/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/kakao copying build/lib/allauth/socialaccount/providers/kakao/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/kakao copying build/lib/allauth/socialaccount/providers/kakao/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/kakao copying build/lib/allauth/socialaccount/providers/kakao/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/kakao copying build/lib/allauth/socialaccount/providers/kakao/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/kakao copying build/lib/allauth/socialaccount/providers/kakao/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/kakao creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/lemonldap copying build/lib/allauth/socialaccount/providers/lemonldap/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/lemonldap copying build/lib/allauth/socialaccount/providers/lemonldap/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/lemonldap copying build/lib/allauth/socialaccount/providers/lemonldap/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/lemonldap copying build/lib/allauth/socialaccount/providers/lemonldap/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/lemonldap copying build/lib/allauth/socialaccount/providers/lemonldap/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/lemonldap creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/lichess copying build/lib/allauth/socialaccount/providers/lichess/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/lichess copying build/lib/allauth/socialaccount/providers/lichess/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/lichess copying build/lib/allauth/socialaccount/providers/lichess/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/lichess copying build/lib/allauth/socialaccount/providers/lichess/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/lichess copying build/lib/allauth/socialaccount/providers/lichess/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/lichess creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/line copying build/lib/allauth/socialaccount/providers/line/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/line copying build/lib/allauth/socialaccount/providers/line/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/line copying build/lib/allauth/socialaccount/providers/line/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/line copying build/lib/allauth/socialaccount/providers/line/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/line copying build/lib/allauth/socialaccount/providers/line/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/line copying build/lib/allauth/socialaccount/providers/line/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/line creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/linkedin_oauth2 copying build/lib/allauth/socialaccount/providers/linkedin_oauth2/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/linkedin_oauth2 copying build/lib/allauth/socialaccount/providers/linkedin_oauth2/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/linkedin_oauth2 copying build/lib/allauth/socialaccount/providers/linkedin_oauth2/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/linkedin_oauth2 copying build/lib/allauth/socialaccount/providers/linkedin_oauth2/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/linkedin_oauth2 copying build/lib/allauth/socialaccount/providers/linkedin_oauth2/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/linkedin_oauth2 creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/mailchimp copying build/lib/allauth/socialaccount/providers/mailchimp/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/mailchimp copying build/lib/allauth/socialaccount/providers/mailchimp/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/mailchimp copying build/lib/allauth/socialaccount/providers/mailchimp/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/mailchimp copying build/lib/allauth/socialaccount/providers/mailchimp/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/mailchimp copying build/lib/allauth/socialaccount/providers/mailchimp/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/mailchimp creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/mailru copying build/lib/allauth/socialaccount/providers/mailru/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/mailru copying build/lib/allauth/socialaccount/providers/mailru/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/mailru copying build/lib/allauth/socialaccount/providers/mailru/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/mailru copying build/lib/allauth/socialaccount/providers/mailru/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/mailru copying build/lib/allauth/socialaccount/providers/mailru/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/mailru creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/mediawiki copying build/lib/allauth/socialaccount/providers/mediawiki/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/mediawiki copying build/lib/allauth/socialaccount/providers/mediawiki/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/mediawiki copying build/lib/allauth/socialaccount/providers/mediawiki/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/mediawiki copying build/lib/allauth/socialaccount/providers/mediawiki/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/mediawiki copying build/lib/allauth/socialaccount/providers/mediawiki/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/mediawiki creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/meetup copying build/lib/allauth/socialaccount/providers/meetup/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/meetup copying build/lib/allauth/socialaccount/providers/meetup/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/meetup copying build/lib/allauth/socialaccount/providers/meetup/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/meetup copying build/lib/allauth/socialaccount/providers/meetup/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/meetup copying build/lib/allauth/socialaccount/providers/meetup/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/meetup copying build/lib/allauth/socialaccount/providers/meetup/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/meetup creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/microsoft copying build/lib/allauth/socialaccount/providers/microsoft/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/microsoft copying build/lib/allauth/socialaccount/providers/microsoft/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/microsoft copying build/lib/allauth/socialaccount/providers/microsoft/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/microsoft copying build/lib/allauth/socialaccount/providers/microsoft/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/microsoft copying build/lib/allauth/socialaccount/providers/microsoft/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/microsoft creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/miro copying build/lib/allauth/socialaccount/providers/miro/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/miro copying build/lib/allauth/socialaccount/providers/miro/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/miro copying build/lib/allauth/socialaccount/providers/miro/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/miro copying build/lib/allauth/socialaccount/providers/miro/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/miro copying build/lib/allauth/socialaccount/providers/miro/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/miro creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/naver copying build/lib/allauth/socialaccount/providers/naver/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/naver copying build/lib/allauth/socialaccount/providers/naver/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/naver copying build/lib/allauth/socialaccount/providers/naver/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/naver copying build/lib/allauth/socialaccount/providers/naver/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/naver copying build/lib/allauth/socialaccount/providers/naver/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/naver copying build/lib/allauth/socialaccount/providers/naver/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/naver creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/netiq copying build/lib/allauth/socialaccount/providers/netiq/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/netiq copying build/lib/allauth/socialaccount/providers/netiq/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/netiq copying build/lib/allauth/socialaccount/providers/netiq/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/netiq copying build/lib/allauth/socialaccount/providers/netiq/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/netiq copying build/lib/allauth/socialaccount/providers/netiq/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/netiq creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/nextcloud copying build/lib/allauth/socialaccount/providers/nextcloud/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/nextcloud copying build/lib/allauth/socialaccount/providers/nextcloud/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/nextcloud copying build/lib/allauth/socialaccount/providers/nextcloud/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/nextcloud copying build/lib/allauth/socialaccount/providers/nextcloud/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/nextcloud copying build/lib/allauth/socialaccount/providers/nextcloud/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/nextcloud creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/notion copying build/lib/allauth/socialaccount/providers/notion/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/notion copying build/lib/allauth/socialaccount/providers/notion/client.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/notion copying build/lib/allauth/socialaccount/providers/notion/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/notion copying build/lib/allauth/socialaccount/providers/notion/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/notion copying build/lib/allauth/socialaccount/providers/notion/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/notion copying build/lib/allauth/socialaccount/providers/notion/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/notion creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/oauth copying build/lib/allauth/socialaccount/providers/oauth/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/oauth copying build/lib/allauth/socialaccount/providers/oauth/client.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/oauth copying build/lib/allauth/socialaccount/providers/oauth/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/oauth copying build/lib/allauth/socialaccount/providers/oauth/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/oauth copying build/lib/allauth/socialaccount/providers/oauth/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/oauth creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/oauth2 creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/oauth2/tests copying build/lib/allauth/socialaccount/providers/oauth2/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/oauth2/tests copying build/lib/allauth/socialaccount/providers/oauth2/tests/test_views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/oauth2/tests copying build/lib/allauth/socialaccount/providers/oauth2/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/oauth2 copying build/lib/allauth/socialaccount/providers/oauth2/client.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/oauth2 copying build/lib/allauth/socialaccount/providers/oauth2/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/oauth2 copying build/lib/allauth/socialaccount/providers/oauth2/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/oauth2 copying build/lib/allauth/socialaccount/providers/oauth2/utils.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/oauth2 copying build/lib/allauth/socialaccount/providers/oauth2/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/oauth2 creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/odnoklassniki copying build/lib/allauth/socialaccount/providers/odnoklassniki/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/odnoklassniki copying build/lib/allauth/socialaccount/providers/odnoklassniki/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/odnoklassniki copying build/lib/allauth/socialaccount/providers/odnoklassniki/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/odnoklassniki copying build/lib/allauth/socialaccount/providers/odnoklassniki/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/odnoklassniki copying build/lib/allauth/socialaccount/providers/odnoklassniki/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/odnoklassniki creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/okta copying build/lib/allauth/socialaccount/providers/okta/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/okta copying build/lib/allauth/socialaccount/providers/okta/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/okta copying build/lib/allauth/socialaccount/providers/okta/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/okta copying build/lib/allauth/socialaccount/providers/okta/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/okta copying build/lib/allauth/socialaccount/providers/okta/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/okta creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/openid creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/openid/migrations copying build/lib/allauth/socialaccount/providers/openid/migrations/0001_initial.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid/migrations copying build/lib/allauth/socialaccount/providers/openid/migrations/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid/migrations copying build/lib/allauth/socialaccount/providers/openid/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid copying build/lib/allauth/socialaccount/providers/openid/admin.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid copying build/lib/allauth/socialaccount/providers/openid/forms.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid copying build/lib/allauth/socialaccount/providers/openid/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid copying build/lib/allauth/socialaccount/providers/openid/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid copying build/lib/allauth/socialaccount/providers/openid/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid copying build/lib/allauth/socialaccount/providers/openid/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid copying build/lib/allauth/socialaccount/providers/openid/utils.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid copying build/lib/allauth/socialaccount/providers/openid/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/openid_connect copying build/lib/allauth/socialaccount/providers/openid_connect/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid_connect copying build/lib/allauth/socialaccount/providers/openid_connect/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid_connect copying build/lib/allauth/socialaccount/providers/openid_connect/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid_connect copying build/lib/allauth/socialaccount/providers/openid_connect/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid_connect copying build/lib/allauth/socialaccount/providers/openid_connect/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openid_connect creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/openstreetmap copying build/lib/allauth/socialaccount/providers/openstreetmap/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openstreetmap copying build/lib/allauth/socialaccount/providers/openstreetmap/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openstreetmap copying build/lib/allauth/socialaccount/providers/openstreetmap/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openstreetmap copying build/lib/allauth/socialaccount/providers/openstreetmap/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openstreetmap copying build/lib/allauth/socialaccount/providers/openstreetmap/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/openstreetmap creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/orcid copying build/lib/allauth/socialaccount/providers/orcid/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/orcid copying build/lib/allauth/socialaccount/providers/orcid/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/orcid copying build/lib/allauth/socialaccount/providers/orcid/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/orcid copying build/lib/allauth/socialaccount/providers/orcid/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/orcid copying build/lib/allauth/socialaccount/providers/orcid/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/orcid creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/patreon copying build/lib/allauth/socialaccount/providers/patreon/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/patreon copying build/lib/allauth/socialaccount/providers/patreon/constants.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/patreon copying build/lib/allauth/socialaccount/providers/patreon/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/patreon copying build/lib/allauth/socialaccount/providers/patreon/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/patreon copying build/lib/allauth/socialaccount/providers/patreon/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/patreon copying build/lib/allauth/socialaccount/providers/patreon/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/patreon copying build/lib/allauth/socialaccount/providers/patreon/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/patreon creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/paypal copying build/lib/allauth/socialaccount/providers/paypal/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/paypal copying build/lib/allauth/socialaccount/providers/paypal/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/paypal copying build/lib/allauth/socialaccount/providers/paypal/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/paypal copying build/lib/allauth/socialaccount/providers/paypal/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/paypal copying build/lib/allauth/socialaccount/providers/paypal/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/paypal creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/pinterest copying build/lib/allauth/socialaccount/providers/pinterest/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/pinterest copying build/lib/allauth/socialaccount/providers/pinterest/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/pinterest copying build/lib/allauth/socialaccount/providers/pinterest/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/pinterest copying build/lib/allauth/socialaccount/providers/pinterest/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/pinterest copying build/lib/allauth/socialaccount/providers/pinterest/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/pinterest creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/pocket copying build/lib/allauth/socialaccount/providers/pocket/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/pocket copying build/lib/allauth/socialaccount/providers/pocket/client.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/pocket copying build/lib/allauth/socialaccount/providers/pocket/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/pocket copying build/lib/allauth/socialaccount/providers/pocket/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/pocket copying build/lib/allauth/socialaccount/providers/pocket/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/pocket copying build/lib/allauth/socialaccount/providers/pocket/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/pocket copying build/lib/allauth/socialaccount/providers/pocket/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/pocket creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/questrade copying build/lib/allauth/socialaccount/providers/questrade/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/questrade copying build/lib/allauth/socialaccount/providers/questrade/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/questrade copying build/lib/allauth/socialaccount/providers/questrade/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/questrade copying build/lib/allauth/socialaccount/providers/questrade/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/questrade copying build/lib/allauth/socialaccount/providers/questrade/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/questrade creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/quickbooks copying build/lib/allauth/socialaccount/providers/quickbooks/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/quickbooks copying build/lib/allauth/socialaccount/providers/quickbooks/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/quickbooks copying build/lib/allauth/socialaccount/providers/quickbooks/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/quickbooks copying build/lib/allauth/socialaccount/providers/quickbooks/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/quickbooks copying build/lib/allauth/socialaccount/providers/quickbooks/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/quickbooks copying build/lib/allauth/socialaccount/providers/quickbooks/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/quickbooks creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/reddit copying build/lib/allauth/socialaccount/providers/reddit/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/reddit copying build/lib/allauth/socialaccount/providers/reddit/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/reddit copying build/lib/allauth/socialaccount/providers/reddit/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/reddit copying build/lib/allauth/socialaccount/providers/reddit/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/reddit copying build/lib/allauth/socialaccount/providers/reddit/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/reddit creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/robinhood copying build/lib/allauth/socialaccount/providers/robinhood/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/robinhood copying build/lib/allauth/socialaccount/providers/robinhood/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/robinhood copying build/lib/allauth/socialaccount/providers/robinhood/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/robinhood copying build/lib/allauth/socialaccount/providers/robinhood/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/robinhood copying build/lib/allauth/socialaccount/providers/robinhood/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/robinhood creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/salesforce copying build/lib/allauth/socialaccount/providers/salesforce/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/salesforce copying build/lib/allauth/socialaccount/providers/salesforce/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/salesforce copying build/lib/allauth/socialaccount/providers/salesforce/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/salesforce copying build/lib/allauth/socialaccount/providers/salesforce/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/salesforce copying build/lib/allauth/socialaccount/providers/salesforce/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/salesforce creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/saml copying build/lib/allauth/socialaccount/providers/saml/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/saml copying build/lib/allauth/socialaccount/providers/saml/conftest.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/saml copying build/lib/allauth/socialaccount/providers/saml/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/saml copying build/lib/allauth/socialaccount/providers/saml/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/saml copying build/lib/allauth/socialaccount/providers/saml/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/saml copying build/lib/allauth/socialaccount/providers/saml/utils.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/saml copying build/lib/allauth/socialaccount/providers/saml/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/saml creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/sharefile copying build/lib/allauth/socialaccount/providers/sharefile/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/sharefile copying build/lib/allauth/socialaccount/providers/sharefile/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/sharefile copying build/lib/allauth/socialaccount/providers/sharefile/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/sharefile copying build/lib/allauth/socialaccount/providers/sharefile/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/sharefile copying build/lib/allauth/socialaccount/providers/sharefile/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/sharefile creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/shopify copying build/lib/allauth/socialaccount/providers/shopify/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/shopify copying build/lib/allauth/socialaccount/providers/shopify/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/shopify copying build/lib/allauth/socialaccount/providers/shopify/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/shopify copying build/lib/allauth/socialaccount/providers/shopify/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/shopify copying build/lib/allauth/socialaccount/providers/shopify/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/shopify creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/slack copying build/lib/allauth/socialaccount/providers/slack/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/slack copying build/lib/allauth/socialaccount/providers/slack/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/slack copying build/lib/allauth/socialaccount/providers/slack/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/slack copying build/lib/allauth/socialaccount/providers/slack/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/slack copying build/lib/allauth/socialaccount/providers/slack/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/slack copying build/lib/allauth/socialaccount/providers/slack/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/slack creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/snapchat copying build/lib/allauth/socialaccount/providers/snapchat/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/snapchat copying build/lib/allauth/socialaccount/providers/snapchat/constants.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/snapchat copying build/lib/allauth/socialaccount/providers/snapchat/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/snapchat copying build/lib/allauth/socialaccount/providers/snapchat/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/snapchat copying build/lib/allauth/socialaccount/providers/snapchat/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/snapchat copying build/lib/allauth/socialaccount/providers/snapchat/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/snapchat copying build/lib/allauth/socialaccount/providers/snapchat/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/snapchat creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/soundcloud copying build/lib/allauth/socialaccount/providers/soundcloud/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/soundcloud copying build/lib/allauth/socialaccount/providers/soundcloud/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/soundcloud copying build/lib/allauth/socialaccount/providers/soundcloud/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/soundcloud copying build/lib/allauth/socialaccount/providers/soundcloud/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/soundcloud copying build/lib/allauth/socialaccount/providers/soundcloud/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/soundcloud creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/spotify copying build/lib/allauth/socialaccount/providers/spotify/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/spotify copying build/lib/allauth/socialaccount/providers/spotify/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/spotify copying build/lib/allauth/socialaccount/providers/spotify/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/spotify copying build/lib/allauth/socialaccount/providers/spotify/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/spotify copying build/lib/allauth/socialaccount/providers/spotify/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/spotify creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/stackexchange copying build/lib/allauth/socialaccount/providers/stackexchange/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/stackexchange copying build/lib/allauth/socialaccount/providers/stackexchange/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/stackexchange copying build/lib/allauth/socialaccount/providers/stackexchange/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/stackexchange copying build/lib/allauth/socialaccount/providers/stackexchange/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/stackexchange copying build/lib/allauth/socialaccount/providers/stackexchange/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/stackexchange creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/steam copying build/lib/allauth/socialaccount/providers/steam/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/steam copying build/lib/allauth/socialaccount/providers/steam/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/steam copying build/lib/allauth/socialaccount/providers/steam/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/steam copying build/lib/allauth/socialaccount/providers/steam/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/steam copying build/lib/allauth/socialaccount/providers/steam/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/steam creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/stocktwits copying build/lib/allauth/socialaccount/providers/stocktwits/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/stocktwits copying build/lib/allauth/socialaccount/providers/stocktwits/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/stocktwits copying build/lib/allauth/socialaccount/providers/stocktwits/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/stocktwits copying build/lib/allauth/socialaccount/providers/stocktwits/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/stocktwits copying build/lib/allauth/socialaccount/providers/stocktwits/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/stocktwits creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/strava copying build/lib/allauth/socialaccount/providers/strava/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/strava copying build/lib/allauth/socialaccount/providers/strava/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/strava copying build/lib/allauth/socialaccount/providers/strava/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/strava copying build/lib/allauth/socialaccount/providers/strava/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/strava copying build/lib/allauth/socialaccount/providers/strava/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/strava creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/stripe copying build/lib/allauth/socialaccount/providers/stripe/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/stripe copying build/lib/allauth/socialaccount/providers/stripe/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/stripe copying build/lib/allauth/socialaccount/providers/stripe/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/stripe copying build/lib/allauth/socialaccount/providers/stripe/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/stripe copying build/lib/allauth/socialaccount/providers/stripe/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/stripe creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/telegram creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/telegram/templates creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/telegram/templates/telegram copying build/lib/allauth/socialaccount/providers/telegram/templates/telegram/callback.html -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/telegram/templates/telegram creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/telegram/static creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/telegram/static/telegram creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/telegram/static/telegram/js copying build/lib/allauth/socialaccount/providers/telegram/static/telegram/js/telegram.js -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/telegram/static/telegram/js copying build/lib/allauth/socialaccount/providers/telegram/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/telegram copying build/lib/allauth/socialaccount/providers/telegram/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/telegram copying build/lib/allauth/socialaccount/providers/telegram/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/telegram copying build/lib/allauth/socialaccount/providers/telegram/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/telegram copying build/lib/allauth/socialaccount/providers/telegram/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/telegram creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/tiktok copying build/lib/allauth/socialaccount/providers/tiktok/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/tiktok copying build/lib/allauth/socialaccount/providers/tiktok/client.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/tiktok copying build/lib/allauth/socialaccount/providers/tiktok/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/tiktok copying build/lib/allauth/socialaccount/providers/tiktok/scope.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/tiktok copying build/lib/allauth/socialaccount/providers/tiktok/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/tiktok copying build/lib/allauth/socialaccount/providers/tiktok/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/tiktok copying build/lib/allauth/socialaccount/providers/tiktok/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/tiktok creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/trainingpeaks copying build/lib/allauth/socialaccount/providers/trainingpeaks/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/trainingpeaks copying build/lib/allauth/socialaccount/providers/trainingpeaks/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/trainingpeaks copying build/lib/allauth/socialaccount/providers/trainingpeaks/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/trainingpeaks copying build/lib/allauth/socialaccount/providers/trainingpeaks/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/trainingpeaks copying build/lib/allauth/socialaccount/providers/trainingpeaks/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/trainingpeaks creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/trello copying build/lib/allauth/socialaccount/providers/trello/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/trello copying build/lib/allauth/socialaccount/providers/trello/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/trello copying build/lib/allauth/socialaccount/providers/trello/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/trello copying build/lib/allauth/socialaccount/providers/trello/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/trello copying build/lib/allauth/socialaccount/providers/trello/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/trello creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/tumblr copying build/lib/allauth/socialaccount/providers/tumblr/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/tumblr copying build/lib/allauth/socialaccount/providers/tumblr/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/tumblr copying build/lib/allauth/socialaccount/providers/tumblr/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/tumblr copying build/lib/allauth/socialaccount/providers/tumblr/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/tumblr copying build/lib/allauth/socialaccount/providers/tumblr/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/tumblr creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/twentythreeandme copying build/lib/allauth/socialaccount/providers/twentythreeandme/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twentythreeandme copying build/lib/allauth/socialaccount/providers/twentythreeandme/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twentythreeandme copying build/lib/allauth/socialaccount/providers/twentythreeandme/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twentythreeandme copying build/lib/allauth/socialaccount/providers/twentythreeandme/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twentythreeandme copying build/lib/allauth/socialaccount/providers/twentythreeandme/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twentythreeandme creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/twitch copying build/lib/allauth/socialaccount/providers/twitch/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twitch copying build/lib/allauth/socialaccount/providers/twitch/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twitch copying build/lib/allauth/socialaccount/providers/twitch/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twitch copying build/lib/allauth/socialaccount/providers/twitch/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twitch copying build/lib/allauth/socialaccount/providers/twitch/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twitch creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/twitter copying build/lib/allauth/socialaccount/providers/twitter/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twitter copying build/lib/allauth/socialaccount/providers/twitter/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twitter copying build/lib/allauth/socialaccount/providers/twitter/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twitter copying build/lib/allauth/socialaccount/providers/twitter/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twitter copying build/lib/allauth/socialaccount/providers/twitter/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twitter creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/twitter_oauth2 copying build/lib/allauth/socialaccount/providers/twitter_oauth2/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twitter_oauth2 copying build/lib/allauth/socialaccount/providers/twitter_oauth2/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twitter_oauth2 copying build/lib/allauth/socialaccount/providers/twitter_oauth2/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twitter_oauth2 copying build/lib/allauth/socialaccount/providers/twitter_oauth2/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twitter_oauth2 copying build/lib/allauth/socialaccount/providers/twitter_oauth2/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/twitter_oauth2 creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/untappd copying build/lib/allauth/socialaccount/providers/untappd/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/untappd copying build/lib/allauth/socialaccount/providers/untappd/client.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/untappd copying build/lib/allauth/socialaccount/providers/untappd/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/untappd copying build/lib/allauth/socialaccount/providers/untappd/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/untappd copying build/lib/allauth/socialaccount/providers/untappd/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/untappd copying build/lib/allauth/socialaccount/providers/untappd/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/untappd creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/vimeo copying build/lib/allauth/socialaccount/providers/vimeo/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vimeo copying build/lib/allauth/socialaccount/providers/vimeo/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vimeo copying build/lib/allauth/socialaccount/providers/vimeo/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vimeo copying build/lib/allauth/socialaccount/providers/vimeo/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vimeo copying build/lib/allauth/socialaccount/providers/vimeo/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vimeo creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/vimeo_oauth2 copying build/lib/allauth/socialaccount/providers/vimeo_oauth2/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vimeo_oauth2 copying build/lib/allauth/socialaccount/providers/vimeo_oauth2/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vimeo_oauth2 copying build/lib/allauth/socialaccount/providers/vimeo_oauth2/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vimeo_oauth2 copying build/lib/allauth/socialaccount/providers/vimeo_oauth2/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vimeo_oauth2 copying build/lib/allauth/socialaccount/providers/vimeo_oauth2/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vimeo_oauth2 copying build/lib/allauth/socialaccount/providers/vimeo_oauth2/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vimeo_oauth2 creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/vk copying build/lib/allauth/socialaccount/providers/vk/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vk copying build/lib/allauth/socialaccount/providers/vk/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vk copying build/lib/allauth/socialaccount/providers/vk/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vk copying build/lib/allauth/socialaccount/providers/vk/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vk copying build/lib/allauth/socialaccount/providers/vk/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/vk creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/wahoo copying build/lib/allauth/socialaccount/providers/wahoo/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/wahoo copying build/lib/allauth/socialaccount/providers/wahoo/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/wahoo copying build/lib/allauth/socialaccount/providers/wahoo/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/wahoo copying build/lib/allauth/socialaccount/providers/wahoo/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/wahoo copying build/lib/allauth/socialaccount/providers/wahoo/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/wahoo creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/weibo copying build/lib/allauth/socialaccount/providers/weibo/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/weibo copying build/lib/allauth/socialaccount/providers/weibo/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/weibo copying build/lib/allauth/socialaccount/providers/weibo/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/weibo copying build/lib/allauth/socialaccount/providers/weibo/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/weibo copying build/lib/allauth/socialaccount/providers/weibo/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/weibo creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/weixin copying build/lib/allauth/socialaccount/providers/weixin/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/weixin copying build/lib/allauth/socialaccount/providers/weixin/client.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/weixin copying build/lib/allauth/socialaccount/providers/weixin/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/weixin copying build/lib/allauth/socialaccount/providers/weixin/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/weixin copying build/lib/allauth/socialaccount/providers/weixin/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/weixin copying build/lib/allauth/socialaccount/providers/weixin/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/weixin creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/windowslive copying build/lib/allauth/socialaccount/providers/windowslive/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/windowslive copying build/lib/allauth/socialaccount/providers/windowslive/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/windowslive copying build/lib/allauth/socialaccount/providers/windowslive/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/windowslive copying build/lib/allauth/socialaccount/providers/windowslive/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/windowslive copying build/lib/allauth/socialaccount/providers/windowslive/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/windowslive creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/xing copying build/lib/allauth/socialaccount/providers/xing/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/xing copying build/lib/allauth/socialaccount/providers/xing/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/xing copying build/lib/allauth/socialaccount/providers/xing/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/xing copying build/lib/allauth/socialaccount/providers/xing/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/xing copying build/lib/allauth/socialaccount/providers/xing/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/xing creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/yahoo copying build/lib/allauth/socialaccount/providers/yahoo/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/yahoo copying build/lib/allauth/socialaccount/providers/yahoo/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/yahoo copying build/lib/allauth/socialaccount/providers/yahoo/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/yahoo copying build/lib/allauth/socialaccount/providers/yahoo/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/yahoo copying build/lib/allauth/socialaccount/providers/yahoo/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/yahoo copying build/lib/allauth/socialaccount/providers/yahoo/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/yahoo creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/yandex copying build/lib/allauth/socialaccount/providers/yandex/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/yandex copying build/lib/allauth/socialaccount/providers/yandex/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/yandex copying build/lib/allauth/socialaccount/providers/yandex/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/yandex copying build/lib/allauth/socialaccount/providers/yandex/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/yandex copying build/lib/allauth/socialaccount/providers/yandex/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/yandex creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/ynab copying build/lib/allauth/socialaccount/providers/ynab/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/ynab copying build/lib/allauth/socialaccount/providers/ynab/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/ynab copying build/lib/allauth/socialaccount/providers/ynab/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/ynab copying build/lib/allauth/socialaccount/providers/ynab/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/ynab copying build/lib/allauth/socialaccount/providers/ynab/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/ynab creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/zoho copying build/lib/allauth/socialaccount/providers/zoho/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/zoho copying build/lib/allauth/socialaccount/providers/zoho/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/zoho copying build/lib/allauth/socialaccount/providers/zoho/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/zoho copying build/lib/allauth/socialaccount/providers/zoho/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/zoho copying build/lib/allauth/socialaccount/providers/zoho/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/zoho creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/providers/zoom copying build/lib/allauth/socialaccount/providers/zoom/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/zoom copying build/lib/allauth/socialaccount/providers/zoom/provider.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/zoom copying build/lib/allauth/socialaccount/providers/zoom/tests.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/zoom copying build/lib/allauth/socialaccount/providers/zoom/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/zoom copying build/lib/allauth/socialaccount/providers/zoom/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers/zoom copying build/lib/allauth/socialaccount/providers/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/providers creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/templatetags copying build/lib/allauth/socialaccount/templatetags/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/templatetags copying build/lib/allauth/socialaccount/templatetags/socialaccount.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/templatetags creating build/bdist.linux-x86_64/wheel/allauth/socialaccount/tests copying build/lib/allauth/socialaccount/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/tests copying build/lib/allauth/socialaccount/tests/conftest.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/tests copying build/lib/allauth/socialaccount/tests/test_adapter.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/tests copying build/lib/allauth/socialaccount/tests/test_connect.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/tests copying build/lib/allauth/socialaccount/tests/test_login.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/tests copying build/lib/allauth/socialaccount/tests/test_registry.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/tests copying build/lib/allauth/socialaccount/tests/test_signup.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/tests copying build/lib/allauth/socialaccount/tests/test_utils.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount/tests copying build/lib/allauth/socialaccount/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount copying build/lib/allauth/socialaccount/adapter.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount copying build/lib/allauth/socialaccount/admin.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount copying build/lib/allauth/socialaccount/app_settings.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount copying build/lib/allauth/socialaccount/apps.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount copying build/lib/allauth/socialaccount/conftest.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount copying build/lib/allauth/socialaccount/forms.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount copying build/lib/allauth/socialaccount/helpers.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount copying build/lib/allauth/socialaccount/models.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount copying build/lib/allauth/socialaccount/sessions.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount copying build/lib/allauth/socialaccount/signals.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount copying build/lib/allauth/socialaccount/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount copying build/lib/allauth/socialaccount/views.py -> build/bdist.linux-x86_64/wheel/./allauth/socialaccount creating build/bdist.linux-x86_64/wheel/allauth/templatetags copying build/lib/allauth/templatetags/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/templatetags copying build/lib/allauth/templatetags/allauth.py -> build/bdist.linux-x86_64/wheel/./allauth/templatetags creating build/bdist.linux-x86_64/wheel/allauth/usersessions creating build/bdist.linux-x86_64/wheel/allauth/usersessions/internal creating build/bdist.linux-x86_64/wheel/allauth/usersessions/internal/flows copying build/lib/allauth/usersessions/internal/flows/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions/internal/flows copying build/lib/allauth/usersessions/internal/flows/sessions.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions/internal/flows copying build/lib/allauth/usersessions/internal/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions/internal creating build/bdist.linux-x86_64/wheel/allauth/usersessions/migrations copying build/lib/allauth/usersessions/migrations/0001_initial.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions/migrations copying build/lib/allauth/usersessions/migrations/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions/migrations creating build/bdist.linux-x86_64/wheel/allauth/usersessions/tests copying build/lib/allauth/usersessions/tests/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions/tests copying build/lib/allauth/usersessions/tests/test_middleware.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions/tests copying build/lib/allauth/usersessions/tests/test_views.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions/tests copying build/lib/allauth/usersessions/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions copying build/lib/allauth/usersessions/adapter.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions copying build/lib/allauth/usersessions/admin.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions copying build/lib/allauth/usersessions/app_settings.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions copying build/lib/allauth/usersessions/apps.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions copying build/lib/allauth/usersessions/forms.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions copying build/lib/allauth/usersessions/middleware.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions copying build/lib/allauth/usersessions/models.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions copying build/lib/allauth/usersessions/signals.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions copying build/lib/allauth/usersessions/urls.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions copying build/lib/allauth/usersessions/views.py -> build/bdist.linux-x86_64/wheel/./allauth/usersessions copying build/lib/allauth/__init__.py -> build/bdist.linux-x86_64/wheel/./allauth copying build/lib/allauth/app_settings.py -> build/bdist.linux-x86_64/wheel/./allauth copying build/lib/allauth/conftest.py -> build/bdist.linux-x86_64/wheel/./allauth copying build/lib/allauth/decorators.py -> build/bdist.linux-x86_64/wheel/./allauth copying build/lib/allauth/exceptions.py -> build/bdist.linux-x86_64/wheel/./allauth copying build/lib/allauth/models.py -> build/bdist.linux-x86_64/wheel/./allauth copying build/lib/allauth/ratelimit.py -> build/bdist.linux-x86_64/wheel/./allauth copying build/lib/allauth/tests.py -> build/bdist.linux-x86_64/wheel/./allauth copying build/lib/allauth/urls.py -> build/bdist.linux-x86_64/wheel/./allauth copying build/lib/allauth/utils.py -> build/bdist.linux-x86_64/wheel/./allauth running install_egg_info Copying django_allauth.egg-info to build/bdist.linux-x86_64/wheel/./django_allauth-65.3.0-py3.14.egg-info running install_scripts creating build/bdist.linux-x86_64/wheel/django_allauth-65.3.0.dist-info/WHEEL creating '/builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir/pip-wheel-7rzazeme/.tmp-ilt_99ts/django_allauth-65.3.0-py3-none-any.whl' and adding 'build/bdist.linux-x86_64/wheel' to it adding 'allauth/__init__.py' adding 'allauth/app_settings.py' adding 'allauth/conftest.py' adding 'allauth/decorators.py' adding 'allauth/exceptions.py' adding 'allauth/models.py' adding 'allauth/ratelimit.py' adding 'allauth/tests.py' adding 'allauth/urls.py' adding 'allauth/utils.py' adding 'allauth/account/__init__.py' adding 'allauth/account/adapter.py' adding 'allauth/account/admin.py' adding 'allauth/account/app_settings.py' adding 'allauth/account/apps.py' adding 'allauth/account/auth_backends.py' adding 'allauth/account/authentication.py' adding 'allauth/account/checks.py' adding 'allauth/account/decorators.py' adding 'allauth/account/forms.py' adding 'allauth/account/managers.py' adding 'allauth/account/middleware.py' adding 'allauth/account/mixins.py' adding 'allauth/account/models.py' adding 'allauth/account/reauthentication.py' adding 'allauth/account/signals.py' adding 'allauth/account/stages.py' adding 'allauth/account/urls.py' adding 'allauth/account/utils.py' adding 'allauth/account/views.py' adding 'allauth/account/internal/__init__.py' adding 'allauth/account/internal/decorators.py' adding 'allauth/account/internal/stagekit.py' adding 'allauth/account/internal/flows/__init__.py' adding 'allauth/account/internal/flows/email_verification.py' adding 'allauth/account/internal/flows/email_verification_by_code.py' adding 'allauth/account/internal/flows/login.py' adding 'allauth/account/internal/flows/login_by_code.py' adding 'allauth/account/internal/flows/logout.py' adding 'allauth/account/internal/flows/manage_email.py' adding 'allauth/account/internal/flows/password_change.py' adding 'allauth/account/internal/flows/password_reset.py' adding 'allauth/account/internal/flows/reauthentication.py' adding 'allauth/account/internal/flows/signup.py' adding 'allauth/account/management/__init__.py' adding 'allauth/account/management/commands/__init__.py' adding 'allauth/account/management/commands/account_unsetmultipleprimaryemails.py' adding 'allauth/account/migrations/0001_initial.py' adding 'allauth/account/migrations/0002_email_max_length.py' adding 'allauth/account/migrations/0003_alter_emailaddress_create_unique_verified_email.py' adding 'allauth/account/migrations/0004_alter_emailaddress_drop_unique_email.py' adding 'allauth/account/migrations/0005_emailaddress_idx_upper_email.py' adding 'allauth/account/migrations/0006_emailaddress_lower.py' adding 'allauth/account/migrations/0007_emailaddress_idx_email.py' adding 'allauth/account/migrations/0008_emailaddress_unique_primary_email_fixup.py' adding 'allauth/account/migrations/0009_emailaddress_unique_primary_email.py' adding 'allauth/account/migrations/__init__.py' adding 'allauth/account/templatetags/__init__.py' adding 'allauth/account/templatetags/account.py' adding 'allauth/account/tests/__init__.py' adding 'allauth/account/tests/test_adapter.py' adding 'allauth/account/tests/test_ajax.py' adding 'allauth/account/tests/test_auth_backends.py' adding 'allauth/account/tests/test_change_email.py' adding 'allauth/account/tests/test_change_password.py' adding 'allauth/account/tests/test_commands.py' adding 'allauth/account/tests/test_decorators.py' adding 'allauth/account/tests/test_email_verification.py' adding 'allauth/account/tests/test_email_verification_by_code.py' adding 'allauth/account/tests/test_login.py' adding 'allauth/account/tests/test_login_by_code.py' adding 'allauth/account/tests/test_logout.py' adding 'allauth/account/tests/test_middleware.py' adding 'allauth/account/tests/test_models.py' adding 'allauth/account/tests/test_ratelimit.py' adding 'allauth/account/tests/test_reauthentication.py' adding 'allauth/account/tests/test_reset_password.py' adding 'allauth/account/tests/test_security.py' adding 'allauth/account/tests/test_signup.py' adding 'allauth/account/tests/test_utils.py' adding 'allauth/core/__init__.py' adding 'allauth/core/context.py' adding 'allauth/core/exceptions.py' adding 'allauth/core/ratelimit.py' adding 'allauth/core/internal/__init__.py' adding 'allauth/core/internal/adapter.py' adding 'allauth/core/internal/httpkit.py' adding 'allauth/core/internal/tests/__init__.py' adding 'allauth/core/internal/tests/test_httpkit.py' adding 'allauth/core/tests/__init__.py' adding 'allauth/core/tests/test_ratelimit.py' adding 'allauth/headless/__init__.py' adding 'allauth/headless/adapter.py' adding 'allauth/headless/app_settings.py' adding 'allauth/headless/apps.py' adding 'allauth/headless/conftest.py' adding 'allauth/headless/constants.py' adding 'allauth/headless/urls.py' adding 'allauth/headless/account/__init__.py' adding 'allauth/headless/account/inputs.py' adding 'allauth/headless/account/response.py' adding 'allauth/headless/account/urls.py' adding 'allauth/headless/account/views.py' adding 'allauth/headless/account/tests/__init__.py' adding 'allauth/headless/account/tests/test_change_email.py' adding 'allauth/headless/account/tests/test_change_password.py' adding 'allauth/headless/account/tests/test_email_verification.py' adding 'allauth/headless/account/tests/test_email_verification_by_code.py' adding 'allauth/headless/account/tests/test_login.py' adding 'allauth/headless/account/tests/test_login_by_code.py' adding 'allauth/headless/account/tests/test_reauthentication.py' adding 'allauth/headless/account/tests/test_reset_password.py' adding 'allauth/headless/account/tests/test_session.py' adding 'allauth/headless/account/tests/test_signup.py' adding 'allauth/headless/base/__init__.py' adding 'allauth/headless/base/response.py' adding 'allauth/headless/base/urls.py' adding 'allauth/headless/base/views.py' adding 'allauth/headless/base/tests/__init__.py' adding 'allauth/headless/base/tests/test_views.py' adding 'allauth/headless/internal/__init__.py' adding 'allauth/headless/internal/authkit.py' adding 'allauth/headless/internal/decorators.py' adding 'allauth/headless/internal/sessionkit.py' adding 'allauth/headless/internal/restkit/__init__.py' adding 'allauth/headless/internal/restkit/inputs.py' adding 'allauth/headless/internal/restkit/response.py' adding 'allauth/headless/internal/restkit/views.py' adding 'allauth/headless/internal/tests/__init__.py' adding 'allauth/headless/internal/tests/test_authkit.py' adding 'allauth/headless/mfa/__init__.py' adding 'allauth/headless/mfa/inputs.py' adding 'allauth/headless/mfa/response.py' adding 'allauth/headless/mfa/urls.py' adding 'allauth/headless/mfa/views.py' adding 'allauth/headless/mfa/tests/__init__.py' adding 'allauth/headless/mfa/tests/test_recovery_codes.py' adding 'allauth/headless/mfa/tests/test_totp.py' adding 'allauth/headless/mfa/tests/test_views.py' adding 'allauth/headless/mfa/tests/test_webauthn.py' adding 'allauth/headless/socialaccount/__init__.py' adding 'allauth/headless/socialaccount/forms.py' adding 'allauth/headless/socialaccount/inputs.py' adding 'allauth/headless/socialaccount/internal.py' adding 'allauth/headless/socialaccount/response.py' adding 'allauth/headless/socialaccount/urls.py' adding 'allauth/headless/socialaccount/views.py' adding 'allauth/headless/socialaccount/tests/__init__.py' adding 'allauth/headless/socialaccount/tests/test_inputs.py' adding 'allauth/headless/socialaccount/tests/test_views.py' adding 'allauth/headless/tests/__init__.py' adding 'allauth/headless/tests/test_tokens.py' adding 'allauth/headless/tokens/__init__.py' adding 'allauth/headless/tokens/base.py' adding 'allauth/headless/tokens/sessions.py' adding 'allauth/headless/usersessions/__init__.py' adding 'allauth/headless/usersessions/inputs.py' adding 'allauth/headless/usersessions/response.py' adding 'allauth/headless/usersessions/urls.py' adding 'allauth/headless/usersessions/views.py' adding 'allauth/headless/usersessions/tests/__init__.py' adding 'allauth/headless/usersessions/tests/test_views.py' adding 'allauth/locale/ar/LC_MESSAGES/django.po' adding 'allauth/locale/az/LC_MESSAGES/django.po' adding 'allauth/locale/bg/LC_MESSAGES/django.po' adding 'allauth/locale/ca/LC_MESSAGES/django.po' adding 'allauth/locale/cs/LC_MESSAGES/django.po' adding 'allauth/locale/da/LC_MESSAGES/django.po' adding 'allauth/locale/de/LC_MESSAGES/django.po' adding 'allauth/locale/el/LC_MESSAGES/django.po' adding 'allauth/locale/en/LC_MESSAGES/django.po' adding 'allauth/locale/es/LC_MESSAGES/django.po' adding 'allauth/locale/et/LC_MESSAGES/django.po' adding 'allauth/locale/eu/LC_MESSAGES/django.po' adding 'allauth/locale/fa/LC_MESSAGES/django.po' adding 'allauth/locale/fi/LC_MESSAGES/django.po' adding 'allauth/locale/fr/LC_MESSAGES/django.po' adding 'allauth/locale/he/LC_MESSAGES/django.po' adding 'allauth/locale/hr/LC_MESSAGES/django.po' adding 'allauth/locale/hu/LC_MESSAGES/django.po' adding 'allauth/locale/id/LC_MESSAGES/django.po' adding 'allauth/locale/it/LC_MESSAGES/django.po' adding 'allauth/locale/ja/LC_MESSAGES/django.po' adding 'allauth/locale/ka/LC_MESSAGES/django.po' adding 'allauth/locale/ko/LC_MESSAGES/django.po' adding 'allauth/locale/ky/LC_MESSAGES/django.po' adding 'allauth/locale/lt/LC_MESSAGES/django.po' adding 'allauth/locale/lv/LC_MESSAGES/django.po' adding 'allauth/locale/mn/LC_MESSAGES/django.po' adding 'allauth/locale/nb/LC_MESSAGES/django.po' adding 'allauth/locale/nl/LC_MESSAGES/django.po' adding 'allauth/locale/pl/LC_MESSAGES/django.po' adding 'allauth/locale/pt_BR/LC_MESSAGES/django.po' adding 'allauth/locale/pt_PT/LC_MESSAGES/django.po' adding 'allauth/locale/ro/LC_MESSAGES/django.po' adding 'allauth/locale/ru/LC_MESSAGES/django.po' adding 'allauth/locale/sk/LC_MESSAGES/django.po' adding 'allauth/locale/sl/LC_MESSAGES/django.po' adding 'allauth/locale/sr/LC_MESSAGES/django.po' adding 'allauth/locale/sr_Latn/LC_MESSAGES/django.po' adding 'allauth/locale/sv/LC_MESSAGES/django.po' adding 'allauth/locale/th/LC_MESSAGES/django.po' adding 'allauth/locale/tr/LC_MESSAGES/django.po' adding 'allauth/locale/uk/LC_MESSAGES/django.po' adding 'allauth/locale/uz/LC_MESSAGES/django.po' adding 'allauth/locale/zh_Hans/LC_MESSAGES/django.po' adding 'allauth/locale/zh_Hant/LC_MESSAGES/django.po' adding 'allauth/mfa/__init__.py' adding 'allauth/mfa/adapter.py' adding 'allauth/mfa/admin.py' adding 'allauth/mfa/app_settings.py' adding 'allauth/mfa/apps.py' adding 'allauth/mfa/checks.py' adding 'allauth/mfa/models.py' adding 'allauth/mfa/signals.py' adding 'allauth/mfa/stages.py' adding 'allauth/mfa/urls.py' adding 'allauth/mfa/utils.py' adding 'allauth/mfa/base/__init__.py' adding 'allauth/mfa/base/forms.py' adding 'allauth/mfa/base/urls.py' adding 'allauth/mfa/base/views.py' adding 'allauth/mfa/base/internal/__init__.py' adding 'allauth/mfa/base/internal/flows.py' adding 'allauth/mfa/base/tests/__init__.py' adding 'allauth/mfa/base/tests/test_views.py' adding 'allauth/mfa/internal/__init__.py' adding 'allauth/mfa/internal/flows/__init__.py' adding 'allauth/mfa/internal/flows/add.py' adding 'allauth/mfa/migrations/0001_initial.py' adding 'allauth/mfa/migrations/0002_authenticator_timestamps.py' adding 'allauth/mfa/migrations/0003_authenticator_type_uniq.py' adding 'allauth/mfa/migrations/__init__.py' adding 'allauth/mfa/recovery_codes/__init__.py' adding 'allauth/mfa/recovery_codes/forms.py' adding 'allauth/mfa/recovery_codes/urls.py' adding 'allauth/mfa/recovery_codes/views.py' adding 'allauth/mfa/recovery_codes/internal/__init__.py' adding 'allauth/mfa/recovery_codes/internal/auth.py' adding 'allauth/mfa/recovery_codes/internal/flows.py' adding 'allauth/mfa/recovery_codes/tests/__init__.py' adding 'allauth/mfa/recovery_codes/tests/test_auth.py' adding 'allauth/mfa/recovery_codes/tests/test_views.py' adding 'allauth/mfa/static/mfa/js/webauthn-json.js' adding 'allauth/mfa/static/mfa/js/webauthn.js' adding 'allauth/mfa/totp/__init__.py' adding 'allauth/mfa/totp/forms.py' adding 'allauth/mfa/totp/urls.py' adding 'allauth/mfa/totp/views.py' adding 'allauth/mfa/totp/internal/__init__.py' adding 'allauth/mfa/totp/internal/auth.py' adding 'allauth/mfa/totp/internal/flows.py' adding 'allauth/mfa/totp/tests/__init__.py' adding 'allauth/mfa/totp/tests/test_unit.py' adding 'allauth/mfa/totp/tests/test_views.py' adding 'allauth/mfa/webauthn/__init__.py' adding 'allauth/mfa/webauthn/forms.py' adding 'allauth/mfa/webauthn/stages.py' adding 'allauth/mfa/webauthn/urls.py' adding 'allauth/mfa/webauthn/views.py' adding 'allauth/mfa/webauthn/internal/__init__.py' adding 'allauth/mfa/webauthn/internal/auth.py' adding 'allauth/mfa/webauthn/internal/flows.py' adding 'allauth/mfa/webauthn/tests/__init__.py' adding 'allauth/mfa/webauthn/tests/test_views.py' adding 'allauth/socialaccount/__init__.py' adding 'allauth/socialaccount/adapter.py' adding 'allauth/socialaccount/admin.py' adding 'allauth/socialaccount/app_settings.py' adding 'allauth/socialaccount/apps.py' adding 'allauth/socialaccount/conftest.py' adding 'allauth/socialaccount/forms.py' adding 'allauth/socialaccount/helpers.py' adding 'allauth/socialaccount/models.py' adding 'allauth/socialaccount/sessions.py' adding 'allauth/socialaccount/signals.py' adding 'allauth/socialaccount/urls.py' adding 'allauth/socialaccount/views.py' adding 'allauth/socialaccount/internal/__init__.py' adding 'allauth/socialaccount/internal/jwtkit.py' adding 'allauth/socialaccount/internal/statekit.py' adding 'allauth/socialaccount/internal/flows/__init__.py' adding 'allauth/socialaccount/internal/flows/connect.py' adding 'allauth/socialaccount/internal/flows/email_authentication.py' adding 'allauth/socialaccount/internal/flows/login.py' adding 'allauth/socialaccount/internal/flows/signup.py' adding 'allauth/socialaccount/internal/tests/__init__.py' adding 'allauth/socialaccount/internal/tests/test_jwtkit.py' adding 'allauth/socialaccount/internal/tests/test_statekit.py' adding 'allauth/socialaccount/migrations/0001_initial.py' adding 'allauth/socialaccount/migrations/0002_token_max_lengths.py' adding 'allauth/socialaccount/migrations/0003_extra_data_default_dict.py' adding 'allauth/socialaccount/migrations/0004_app_provider_id_settings.py' adding 'allauth/socialaccount/migrations/0005_socialtoken_nullable_app.py' adding 'allauth/socialaccount/migrations/0006_alter_socialaccount_extra_data.py' adding 'allauth/socialaccount/migrations/__init__.py' adding 'allauth/socialaccount/providers/__init__.py' adding 'allauth/socialaccount/providers/agave/__init__.py' adding 'allauth/socialaccount/providers/agave/provider.py' adding 'allauth/socialaccount/providers/agave/tests.py' adding 'allauth/socialaccount/providers/agave/urls.py' adding 'allauth/socialaccount/providers/agave/views.py' adding 'allauth/socialaccount/providers/amazon/__init__.py' adding 'allauth/socialaccount/providers/amazon/provider.py' adding 'allauth/socialaccount/providers/amazon/tests.py' adding 'allauth/socialaccount/providers/amazon/urls.py' adding 'allauth/socialaccount/providers/amazon/views.py' adding 'allauth/socialaccount/providers/amazon_cognito/__init__.py' adding 'allauth/socialaccount/providers/amazon_cognito/provider.py' adding 'allauth/socialaccount/providers/amazon_cognito/tests.py' adding 'allauth/socialaccount/providers/amazon_cognito/urls.py' adding 'allauth/socialaccount/providers/amazon_cognito/utils.py' adding 'allauth/socialaccount/providers/amazon_cognito/views.py' adding 'allauth/socialaccount/providers/angellist/__init__.py' adding 'allauth/socialaccount/providers/angellist/provider.py' adding 'allauth/socialaccount/providers/angellist/tests.py' adding 'allauth/socialaccount/providers/angellist/urls.py' adding 'allauth/socialaccount/providers/angellist/views.py' adding 'allauth/socialaccount/providers/apple/__init__.py' adding 'allauth/socialaccount/providers/apple/apple_session.py' adding 'allauth/socialaccount/providers/apple/client.py' adding 'allauth/socialaccount/providers/apple/provider.py' adding 'allauth/socialaccount/providers/apple/tests.py' adding 'allauth/socialaccount/providers/apple/urls.py' adding 'allauth/socialaccount/providers/apple/views.py' adding 'allauth/socialaccount/providers/asana/__init__.py' adding 'allauth/socialaccount/providers/asana/models.py' adding 'allauth/socialaccount/providers/asana/provider.py' adding 'allauth/socialaccount/providers/asana/tests.py' adding 'allauth/socialaccount/providers/asana/urls.py' adding 'allauth/socialaccount/providers/asana/views.py' adding 'allauth/socialaccount/providers/atlassian/__init__.py' adding 'allauth/socialaccount/providers/atlassian/provider.py' adding 'allauth/socialaccount/providers/atlassian/tests.py' adding 'allauth/socialaccount/providers/atlassian/urls.py' adding 'allauth/socialaccount/providers/atlassian/views.py' adding 'allauth/socialaccount/providers/auth0/__init__.py' adding 'allauth/socialaccount/providers/auth0/provider.py' adding 'allauth/socialaccount/providers/auth0/tests.py' adding 'allauth/socialaccount/providers/auth0/urls.py' adding 'allauth/socialaccount/providers/auth0/views.py' adding 'allauth/socialaccount/providers/authentiq/__init__.py' adding 'allauth/socialaccount/providers/authentiq/provider.py' adding 'allauth/socialaccount/providers/authentiq/tests.py' adding 'allauth/socialaccount/providers/authentiq/urls.py' adding 'allauth/socialaccount/providers/authentiq/views.py' adding 'allauth/socialaccount/providers/baidu/__init__.py' adding 'allauth/socialaccount/providers/baidu/provider.py' adding 'allauth/socialaccount/providers/baidu/tests.py' adding 'allauth/socialaccount/providers/baidu/urls.py' adding 'allauth/socialaccount/providers/baidu/views.py' adding 'allauth/socialaccount/providers/base/__init__.py' adding 'allauth/socialaccount/providers/base/constants.py' adding 'allauth/socialaccount/providers/base/provider.py' adding 'allauth/socialaccount/providers/base/utils.py' adding 'allauth/socialaccount/providers/base/views.py' adding 'allauth/socialaccount/providers/basecamp/__init__.py' adding 'allauth/socialaccount/providers/basecamp/provider.py' adding 'allauth/socialaccount/providers/basecamp/tests.py' adding 'allauth/socialaccount/providers/basecamp/urls.py' adding 'allauth/socialaccount/providers/basecamp/views.py' adding 'allauth/socialaccount/providers/battlenet/__init__.py' adding 'allauth/socialaccount/providers/battlenet/models.py' adding 'allauth/socialaccount/providers/battlenet/provider.py' adding 'allauth/socialaccount/providers/battlenet/tests.py' adding 'allauth/socialaccount/providers/battlenet/urls.py' adding 'allauth/socialaccount/providers/battlenet/validators.py' adding 'allauth/socialaccount/providers/battlenet/views.py' adding 'allauth/socialaccount/providers/bitbucket_oauth2/__init__.py' adding 'allauth/socialaccount/providers/bitbucket_oauth2/provider.py' adding 'allauth/socialaccount/providers/bitbucket_oauth2/tests.py' adding 'allauth/socialaccount/providers/bitbucket_oauth2/urls.py' adding 'allauth/socialaccount/providers/bitbucket_oauth2/views.py' adding 'allauth/socialaccount/providers/bitly/__init__.py' adding 'allauth/socialaccount/providers/bitly/provider.py' adding 'allauth/socialaccount/providers/bitly/tests.py' adding 'allauth/socialaccount/providers/bitly/urls.py' adding 'allauth/socialaccount/providers/bitly/views.py' adding 'allauth/socialaccount/providers/box/__init__.py' adding 'allauth/socialaccount/providers/box/provider.py' adding 'allauth/socialaccount/providers/box/tests.py' adding 'allauth/socialaccount/providers/box/urls.py' adding 'allauth/socialaccount/providers/box/views.py' adding 'allauth/socialaccount/providers/cilogon/__init__.py' adding 'allauth/socialaccount/providers/cilogon/provider.py' adding 'allauth/socialaccount/providers/cilogon/tests.py' adding 'allauth/socialaccount/providers/cilogon/urls.py' adding 'allauth/socialaccount/providers/cilogon/views.py' adding 'allauth/socialaccount/providers/clever/__init__.py' adding 'allauth/socialaccount/providers/clever/provider.py' adding 'allauth/socialaccount/providers/clever/tests.py' adding 'allauth/socialaccount/providers/clever/urls.py' adding 'allauth/socialaccount/providers/clever/views.py' adding 'allauth/socialaccount/providers/coinbase/__init__.py' adding 'allauth/socialaccount/providers/coinbase/provider.py' adding 'allauth/socialaccount/providers/coinbase/tests.py' adding 'allauth/socialaccount/providers/coinbase/urls.py' adding 'allauth/socialaccount/providers/coinbase/views.py' adding 'allauth/socialaccount/providers/dataporten/__init__.py' adding 'allauth/socialaccount/providers/dataporten/models.py' adding 'allauth/socialaccount/providers/dataporten/provider.py' adding 'allauth/socialaccount/providers/dataporten/tests.py' adding 'allauth/socialaccount/providers/dataporten/urls.py' adding 'allauth/socialaccount/providers/dataporten/views.py' adding 'allauth/socialaccount/providers/daum/__init__.py' adding 'allauth/socialaccount/providers/daum/models.py' adding 'allauth/socialaccount/providers/daum/provider.py' adding 'allauth/socialaccount/providers/daum/tests.py' adding 'allauth/socialaccount/providers/daum/urls.py' adding 'allauth/socialaccount/providers/daum/views.py' adding 'allauth/socialaccount/providers/digitalocean/__init__.py' adding 'allauth/socialaccount/providers/digitalocean/provider.py' adding 'allauth/socialaccount/providers/digitalocean/tests.py' adding 'allauth/socialaccount/providers/digitalocean/urls.py' adding 'allauth/socialaccount/providers/digitalocean/views.py' adding 'allauth/socialaccount/providers/dingtalk/__init__.py' adding 'allauth/socialaccount/providers/dingtalk/client.py' adding 'allauth/socialaccount/providers/dingtalk/provider.py' adding 'allauth/socialaccount/providers/dingtalk/tests.py' adding 'allauth/socialaccount/providers/dingtalk/urls.py' adding 'allauth/socialaccount/providers/dingtalk/views.py' adding 'allauth/socialaccount/providers/discord/__init__.py' adding 'allauth/socialaccount/providers/discord/provider.py' adding 'allauth/socialaccount/providers/discord/tests.py' adding 'allauth/socialaccount/providers/discord/urls.py' adding 'allauth/socialaccount/providers/discord/views.py' adding 'allauth/socialaccount/providers/disqus/__init__.py' adding 'allauth/socialaccount/providers/disqus/provider.py' adding 'allauth/socialaccount/providers/disqus/tests.py' adding 'allauth/socialaccount/providers/disqus/urls.py' adding 'allauth/socialaccount/providers/disqus/views.py' adding 'allauth/socialaccount/providers/douban/__init__.py' adding 'allauth/socialaccount/providers/douban/provider.py' adding 'allauth/socialaccount/providers/douban/tests.py' adding 'allauth/socialaccount/providers/douban/urls.py' adding 'allauth/socialaccount/providers/douban/views.py' adding 'allauth/socialaccount/providers/doximity/__init__.py' adding 'allauth/socialaccount/providers/doximity/provider.py' adding 'allauth/socialaccount/providers/doximity/tests.py' adding 'allauth/socialaccount/providers/doximity/urls.py' adding 'allauth/socialaccount/providers/doximity/views.py' adding 'allauth/socialaccount/providers/draugiem/__init__.py' adding 'allauth/socialaccount/providers/draugiem/provider.py' adding 'allauth/socialaccount/providers/draugiem/tests.py' adding 'allauth/socialaccount/providers/draugiem/urls.py' adding 'allauth/socialaccount/providers/draugiem/views.py' adding 'allauth/socialaccount/providers/drip/__init__.py' adding 'allauth/socialaccount/providers/drip/provider.py' adding 'allauth/socialaccount/providers/drip/tests.py' adding 'allauth/socialaccount/providers/drip/urls.py' adding 'allauth/socialaccount/providers/drip/views.py' adding 'allauth/socialaccount/providers/dropbox/__init__.py' adding 'allauth/socialaccount/providers/dropbox/provider.py' adding 'allauth/socialaccount/providers/dropbox/tests.py' adding 'allauth/socialaccount/providers/dropbox/urls.py' adding 'allauth/socialaccount/providers/dropbox/views.py' adding 'allauth/socialaccount/providers/dummy/__init__.py' adding 'allauth/socialaccount/providers/dummy/forms.py' adding 'allauth/socialaccount/providers/dummy/provider.py' adding 'allauth/socialaccount/providers/dummy/tests.py' adding 'allauth/socialaccount/providers/dummy/urls.py' adding 'allauth/socialaccount/providers/dummy/views.py' adding 'allauth/socialaccount/providers/dummy/templates/dummy/authenticate_form.html' adding 'allauth/socialaccount/providers/dwolla/__init__.py' adding 'allauth/socialaccount/providers/dwolla/models.py' adding 'allauth/socialaccount/providers/dwolla/provider.py' adding 'allauth/socialaccount/providers/dwolla/tests.py' adding 'allauth/socialaccount/providers/dwolla/urls.py' adding 'allauth/socialaccount/providers/dwolla/views.py' adding 'allauth/socialaccount/providers/edmodo/__init__.py' adding 'allauth/socialaccount/providers/edmodo/provider.py' adding 'allauth/socialaccount/providers/edmodo/tests.py' adding 'allauth/socialaccount/providers/edmodo/urls.py' adding 'allauth/socialaccount/providers/edmodo/views.py' adding 'allauth/socialaccount/providers/edx/__init__.py' adding 'allauth/socialaccount/providers/edx/provider.py' adding 'allauth/socialaccount/providers/edx/tests.py' adding 'allauth/socialaccount/providers/edx/urls.py' adding 'allauth/socialaccount/providers/edx/views.py' adding 'allauth/socialaccount/providers/eventbrite/__init__.py' adding 'allauth/socialaccount/providers/eventbrite/provider.py' adding 'allauth/socialaccount/providers/eventbrite/tests.py' adding 'allauth/socialaccount/providers/eventbrite/urls.py' adding 'allauth/socialaccount/providers/eventbrite/views.py' adding 'allauth/socialaccount/providers/eveonline/__init__.py' adding 'allauth/socialaccount/providers/eveonline/provider.py' adding 'allauth/socialaccount/providers/eveonline/tests.py' adding 'allauth/socialaccount/providers/eveonline/urls.py' adding 'allauth/socialaccount/providers/eveonline/views.py' adding 'allauth/socialaccount/providers/evernote/__init__.py' adding 'allauth/socialaccount/providers/evernote/provider.py' adding 'allauth/socialaccount/providers/evernote/tests.py' adding 'allauth/socialaccount/providers/evernote/urls.py' adding 'allauth/socialaccount/providers/evernote/views.py' adding 'allauth/socialaccount/providers/exist/__init__.py' adding 'allauth/socialaccount/providers/exist/provider.py' adding 'allauth/socialaccount/providers/exist/tests.py' adding 'allauth/socialaccount/providers/exist/urls.py' adding 'allauth/socialaccount/providers/exist/views.py' adding 'allauth/socialaccount/providers/facebook/__init__.py' adding 'allauth/socialaccount/providers/facebook/constants.py' adding 'allauth/socialaccount/providers/facebook/flows.py' adding 'allauth/socialaccount/providers/facebook/forms.py' adding 'allauth/socialaccount/providers/facebook/locale.py' adding 'allauth/socialaccount/providers/facebook/provider.py' adding 'allauth/socialaccount/providers/facebook/tests.py' adding 'allauth/socialaccount/providers/facebook/urls.py' adding 'allauth/socialaccount/providers/facebook/views.py' adding 'allauth/socialaccount/providers/facebook/data/FacebookLocales.xml' adding 'allauth/socialaccount/providers/facebook/static/facebook/js/fbconnect.js' adding 'allauth/socialaccount/providers/facebook/templates/facebook/fbconnect.html' adding 'allauth/socialaccount/providers/feedly/__init__.py' adding 'allauth/socialaccount/providers/feedly/provider.py' adding 'allauth/socialaccount/providers/feedly/tests.py' adding 'allauth/socialaccount/providers/feedly/urls.py' adding 'allauth/socialaccount/providers/feedly/views.py' adding 'allauth/socialaccount/providers/feishu/__init__.py' adding 'allauth/socialaccount/providers/feishu/client.py' adding 'allauth/socialaccount/providers/feishu/provider.py' adding 'allauth/socialaccount/providers/feishu/tests.py' adding 'allauth/socialaccount/providers/feishu/urls.py' adding 'allauth/socialaccount/providers/feishu/views.py' adding 'allauth/socialaccount/providers/figma/__init__.py' adding 'allauth/socialaccount/providers/figma/provider.py' adding 'allauth/socialaccount/providers/figma/tests.py' adding 'allauth/socialaccount/providers/figma/urls.py' adding 'allauth/socialaccount/providers/figma/views.py' adding 'allauth/socialaccount/providers/fivehundredpx/__init__.py' adding 'allauth/socialaccount/providers/fivehundredpx/models.py' adding 'allauth/socialaccount/providers/fivehundredpx/provider.py' adding 'allauth/socialaccount/providers/fivehundredpx/tests.py' adding 'allauth/socialaccount/providers/fivehundredpx/urls.py' adding 'allauth/socialaccount/providers/fivehundredpx/views.py' adding 'allauth/socialaccount/providers/flickr/__init__.py' adding 'allauth/socialaccount/providers/flickr/provider.py' adding 'allauth/socialaccount/providers/flickr/tests.py' adding 'allauth/socialaccount/providers/flickr/urls.py' adding 'allauth/socialaccount/providers/flickr/views.py' adding 'allauth/socialaccount/providers/foursquare/__init__.py' adding 'allauth/socialaccount/providers/foursquare/provider.py' adding 'allauth/socialaccount/providers/foursquare/tests.py' adding 'allauth/socialaccount/providers/foursquare/urls.py' adding 'allauth/socialaccount/providers/foursquare/views.py' adding 'allauth/socialaccount/providers/frontier/__init__.py' adding 'allauth/socialaccount/providers/frontier/provider.py' adding 'allauth/socialaccount/providers/frontier/tests.py' adding 'allauth/socialaccount/providers/frontier/urls.py' adding 'allauth/socialaccount/providers/frontier/views.py' adding 'allauth/socialaccount/providers/fxa/__init__.py' adding 'allauth/socialaccount/providers/fxa/constants.py' adding 'allauth/socialaccount/providers/fxa/models.py' adding 'allauth/socialaccount/providers/fxa/provider.py' adding 'allauth/socialaccount/providers/fxa/tests.py' adding 'allauth/socialaccount/providers/fxa/urls.py' adding 'allauth/socialaccount/providers/fxa/views.py' adding 'allauth/socialaccount/providers/gitea/__init__.py' adding 'allauth/socialaccount/providers/gitea/provider.py' adding 'allauth/socialaccount/providers/gitea/tests.py' adding 'allauth/socialaccount/providers/gitea/urls.py' adding 'allauth/socialaccount/providers/gitea/views.py' adding 'allauth/socialaccount/providers/github/__init__.py' adding 'allauth/socialaccount/providers/github/provider.py' adding 'allauth/socialaccount/providers/github/tests.py' adding 'allauth/socialaccount/providers/github/urls.py' adding 'allauth/socialaccount/providers/github/views.py' adding 'allauth/socialaccount/providers/gitlab/__init__.py' adding 'allauth/socialaccount/providers/gitlab/provider.py' adding 'allauth/socialaccount/providers/gitlab/tests.py' adding 'allauth/socialaccount/providers/gitlab/urls.py' adding 'allauth/socialaccount/providers/gitlab/views.py' adding 'allauth/socialaccount/providers/globus/__init__.py' adding 'allauth/socialaccount/providers/globus/provider.py' adding 'allauth/socialaccount/providers/globus/tests.py' adding 'allauth/socialaccount/providers/globus/urls.py' adding 'allauth/socialaccount/providers/globus/views.py' adding 'allauth/socialaccount/providers/google/__init__.py' adding 'allauth/socialaccount/providers/google/provider.py' adding 'allauth/socialaccount/providers/google/tests.py' adding 'allauth/socialaccount/providers/google/urls.py' adding 'allauth/socialaccount/providers/google/views.py' adding 'allauth/socialaccount/providers/gumroad/__init__.py' adding 'allauth/socialaccount/providers/gumroad/provider.py' adding 'allauth/socialaccount/providers/gumroad/tests.py' adding 'allauth/socialaccount/providers/gumroad/urls.py' adding 'allauth/socialaccount/providers/gumroad/views.py' adding 'allauth/socialaccount/providers/hubic/__init__.py' adding 'allauth/socialaccount/providers/hubic/provider.py' adding 'allauth/socialaccount/providers/hubic/tests.py' adding 'allauth/socialaccount/providers/hubic/urls.py' adding 'allauth/socialaccount/providers/hubic/views.py' adding 'allauth/socialaccount/providers/hubspot/__init__.py' adding 'allauth/socialaccount/providers/hubspot/provider.py' adding 'allauth/socialaccount/providers/hubspot/tests.py' adding 'allauth/socialaccount/providers/hubspot/urls.py' adding 'allauth/socialaccount/providers/hubspot/views.py' adding 'allauth/socialaccount/providers/instagram/__init__.py' adding 'allauth/socialaccount/providers/instagram/provider.py' adding 'allauth/socialaccount/providers/instagram/tests.py' adding 'allauth/socialaccount/providers/instagram/urls.py' adding 'allauth/socialaccount/providers/instagram/views.py' adding 'allauth/socialaccount/providers/jupyterhub/__init__.py' adding 'allauth/socialaccount/providers/jupyterhub/provider.py' adding 'allauth/socialaccount/providers/jupyterhub/tests.py' adding 'allauth/socialaccount/providers/jupyterhub/urls.py' adding 'allauth/socialaccount/providers/jupyterhub/views.py' adding 'allauth/socialaccount/providers/kakao/__init__.py' adding 'allauth/socialaccount/providers/kakao/models.py' adding 'allauth/socialaccount/providers/kakao/provider.py' adding 'allauth/socialaccount/providers/kakao/tests.py' adding 'allauth/socialaccount/providers/kakao/urls.py' adding 'allauth/socialaccount/providers/kakao/views.py' adding 'allauth/socialaccount/providers/lemonldap/__init__.py' adding 'allauth/socialaccount/providers/lemonldap/provider.py' adding 'allauth/socialaccount/providers/lemonldap/tests.py' adding 'allauth/socialaccount/providers/lemonldap/urls.py' adding 'allauth/socialaccount/providers/lemonldap/views.py' adding 'allauth/socialaccount/providers/lichess/__init__.py' adding 'allauth/socialaccount/providers/lichess/provider.py' adding 'allauth/socialaccount/providers/lichess/tests.py' adding 'allauth/socialaccount/providers/lichess/urls.py' adding 'allauth/socialaccount/providers/lichess/views.py' adding 'allauth/socialaccount/providers/line/__init__.py' adding 'allauth/socialaccount/providers/line/models.py' adding 'allauth/socialaccount/providers/line/provider.py' adding 'allauth/socialaccount/providers/line/tests.py' adding 'allauth/socialaccount/providers/line/urls.py' adding 'allauth/socialaccount/providers/line/views.py' adding 'allauth/socialaccount/providers/linkedin_oauth2/__init__.py' adding 'allauth/socialaccount/providers/linkedin_oauth2/provider.py' adding 'allauth/socialaccount/providers/linkedin_oauth2/tests.py' adding 'allauth/socialaccount/providers/linkedin_oauth2/urls.py' adding 'allauth/socialaccount/providers/linkedin_oauth2/views.py' adding 'allauth/socialaccount/providers/mailchimp/__init__.py' adding 'allauth/socialaccount/providers/mailchimp/provider.py' adding 'allauth/socialaccount/providers/mailchimp/tests.py' adding 'allauth/socialaccount/providers/mailchimp/urls.py' adding 'allauth/socialaccount/providers/mailchimp/views.py' adding 'allauth/socialaccount/providers/mailru/__init__.py' adding 'allauth/socialaccount/providers/mailru/provider.py' adding 'allauth/socialaccount/providers/mailru/tests.py' adding 'allauth/socialaccount/providers/mailru/urls.py' adding 'allauth/socialaccount/providers/mailru/views.py' adding 'allauth/socialaccount/providers/mediawiki/__init__.py' adding 'allauth/socialaccount/providers/mediawiki/provider.py' adding 'allauth/socialaccount/providers/mediawiki/tests.py' adding 'allauth/socialaccount/providers/mediawiki/urls.py' adding 'allauth/socialaccount/providers/mediawiki/views.py' adding 'allauth/socialaccount/providers/meetup/__init__.py' adding 'allauth/socialaccount/providers/meetup/models.py' adding 'allauth/socialaccount/providers/meetup/provider.py' adding 'allauth/socialaccount/providers/meetup/tests.py' adding 'allauth/socialaccount/providers/meetup/urls.py' adding 'allauth/socialaccount/providers/meetup/views.py' adding 'allauth/socialaccount/providers/microsoft/__init__.py' adding 'allauth/socialaccount/providers/microsoft/provider.py' adding 'allauth/socialaccount/providers/microsoft/tests.py' adding 'allauth/socialaccount/providers/microsoft/urls.py' adding 'allauth/socialaccount/providers/microsoft/views.py' adding 'allauth/socialaccount/providers/miro/__init__.py' adding 'allauth/socialaccount/providers/miro/provider.py' adding 'allauth/socialaccount/providers/miro/tests.py' adding 'allauth/socialaccount/providers/miro/urls.py' adding 'allauth/socialaccount/providers/miro/views.py' adding 'allauth/socialaccount/providers/naver/__init__.py' adding 'allauth/socialaccount/providers/naver/models.py' adding 'allauth/socialaccount/providers/naver/provider.py' adding 'allauth/socialaccount/providers/naver/tests.py' adding 'allauth/socialaccount/providers/naver/urls.py' adding 'allauth/socialaccount/providers/naver/views.py' adding 'allauth/socialaccount/providers/netiq/__init__.py' adding 'allauth/socialaccount/providers/netiq/provider.py' adding 'allauth/socialaccount/providers/netiq/tests.py' adding 'allauth/socialaccount/providers/netiq/urls.py' adding 'allauth/socialaccount/providers/netiq/views.py' adding 'allauth/socialaccount/providers/nextcloud/__init__.py' adding 'allauth/socialaccount/providers/nextcloud/provider.py' adding 'allauth/socialaccount/providers/nextcloud/tests.py' adding 'allauth/socialaccount/providers/nextcloud/urls.py' adding 'allauth/socialaccount/providers/nextcloud/views.py' adding 'allauth/socialaccount/providers/notion/__init__.py' adding 'allauth/socialaccount/providers/notion/client.py' adding 'allauth/socialaccount/providers/notion/provider.py' adding 'allauth/socialaccount/providers/notion/tests.py' adding 'allauth/socialaccount/providers/notion/urls.py' adding 'allauth/socialaccount/providers/notion/views.py' adding 'allauth/socialaccount/providers/oauth/__init__.py' adding 'allauth/socialaccount/providers/oauth/client.py' adding 'allauth/socialaccount/providers/oauth/provider.py' adding 'allauth/socialaccount/providers/oauth/urls.py' adding 'allauth/socialaccount/providers/oauth/views.py' adding 'allauth/socialaccount/providers/oauth2/__init__.py' adding 'allauth/socialaccount/providers/oauth2/client.py' adding 'allauth/socialaccount/providers/oauth2/provider.py' adding 'allauth/socialaccount/providers/oauth2/urls.py' adding 'allauth/socialaccount/providers/oauth2/utils.py' adding 'allauth/socialaccount/providers/oauth2/views.py' adding 'allauth/socialaccount/providers/oauth2/tests/__init__.py' adding 'allauth/socialaccount/providers/oauth2/tests/test_views.py' adding 'allauth/socialaccount/providers/odnoklassniki/__init__.py' adding 'allauth/socialaccount/providers/odnoklassniki/provider.py' adding 'allauth/socialaccount/providers/odnoklassniki/tests.py' adding 'allauth/socialaccount/providers/odnoklassniki/urls.py' adding 'allauth/socialaccount/providers/odnoklassniki/views.py' adding 'allauth/socialaccount/providers/okta/__init__.py' adding 'allauth/socialaccount/providers/okta/provider.py' adding 'allauth/socialaccount/providers/okta/tests.py' adding 'allauth/socialaccount/providers/okta/urls.py' adding 'allauth/socialaccount/providers/okta/views.py' adding 'allauth/socialaccount/providers/openid/__init__.py' adding 'allauth/socialaccount/providers/openid/admin.py' adding 'allauth/socialaccount/providers/openid/forms.py' adding 'allauth/socialaccount/providers/openid/models.py' adding 'allauth/socialaccount/providers/openid/provider.py' adding 'allauth/socialaccount/providers/openid/tests.py' adding 'allauth/socialaccount/providers/openid/urls.py' adding 'allauth/socialaccount/providers/openid/utils.py' adding 'allauth/socialaccount/providers/openid/views.py' adding 'allauth/socialaccount/providers/openid/migrations/0001_initial.py' adding 'allauth/socialaccount/providers/openid/migrations/__init__.py' adding 'allauth/socialaccount/providers/openid_connect/__init__.py' adding 'allauth/socialaccount/providers/openid_connect/provider.py' adding 'allauth/socialaccount/providers/openid_connect/tests.py' adding 'allauth/socialaccount/providers/openid_connect/urls.py' adding 'allauth/socialaccount/providers/openid_connect/views.py' adding 'allauth/socialaccount/providers/openstreetmap/__init__.py' adding 'allauth/socialaccount/providers/openstreetmap/provider.py' adding 'allauth/socialaccount/providers/openstreetmap/tests.py' adding 'allauth/socialaccount/providers/openstreetmap/urls.py' adding 'allauth/socialaccount/providers/openstreetmap/views.py' adding 'allauth/socialaccount/providers/orcid/__init__.py' adding 'allauth/socialaccount/providers/orcid/provider.py' adding 'allauth/socialaccount/providers/orcid/tests.py' adding 'allauth/socialaccount/providers/orcid/urls.py' adding 'allauth/socialaccount/providers/orcid/views.py' adding 'allauth/socialaccount/providers/patreon/__init__.py' adding 'allauth/socialaccount/providers/patreon/constants.py' adding 'allauth/socialaccount/providers/patreon/models.py' adding 'allauth/socialaccount/providers/patreon/provider.py' adding 'allauth/socialaccount/providers/patreon/tests.py' adding 'allauth/socialaccount/providers/patreon/urls.py' adding 'allauth/socialaccount/providers/patreon/views.py' adding 'allauth/socialaccount/providers/paypal/__init__.py' adding 'allauth/socialaccount/providers/paypal/provider.py' adding 'allauth/socialaccount/providers/paypal/tests.py' adding 'allauth/socialaccount/providers/paypal/urls.py' adding 'allauth/socialaccount/providers/paypal/views.py' adding 'allauth/socialaccount/providers/pinterest/__init__.py' adding 'allauth/socialaccount/providers/pinterest/provider.py' adding 'allauth/socialaccount/providers/pinterest/tests.py' adding 'allauth/socialaccount/providers/pinterest/urls.py' adding 'allauth/socialaccount/providers/pinterest/views.py' adding 'allauth/socialaccount/providers/pocket/__init__.py' adding 'allauth/socialaccount/providers/pocket/client.py' adding 'allauth/socialaccount/providers/pocket/models.py' adding 'allauth/socialaccount/providers/pocket/provider.py' adding 'allauth/socialaccount/providers/pocket/tests.py' adding 'allauth/socialaccount/providers/pocket/urls.py' adding 'allauth/socialaccount/providers/pocket/views.py' adding 'allauth/socialaccount/providers/questrade/__init__.py' adding 'allauth/socialaccount/providers/questrade/provider.py' adding 'allauth/socialaccount/providers/questrade/tests.py' adding 'allauth/socialaccount/providers/questrade/urls.py' adding 'allauth/socialaccount/providers/questrade/views.py' adding 'allauth/socialaccount/providers/quickbooks/__init__.py' adding 'allauth/socialaccount/providers/quickbooks/models.py' adding 'allauth/socialaccount/providers/quickbooks/provider.py' adding 'allauth/socialaccount/providers/quickbooks/tests.py' adding 'allauth/socialaccount/providers/quickbooks/urls.py' adding 'allauth/socialaccount/providers/quickbooks/views.py' adding 'allauth/socialaccount/providers/reddit/__init__.py' adding 'allauth/socialaccount/providers/reddit/provider.py' adding 'allauth/socialaccount/providers/reddit/tests.py' adding 'allauth/socialaccount/providers/reddit/urls.py' adding 'allauth/socialaccount/providers/reddit/views.py' adding 'allauth/socialaccount/providers/robinhood/__init__.py' adding 'allauth/socialaccount/providers/robinhood/provider.py' adding 'allauth/socialaccount/providers/robinhood/tests.py' adding 'allauth/socialaccount/providers/robinhood/urls.py' adding 'allauth/socialaccount/providers/robinhood/views.py' adding 'allauth/socialaccount/providers/salesforce/__init__.py' adding 'allauth/socialaccount/providers/salesforce/provider.py' adding 'allauth/socialaccount/providers/salesforce/tests.py' adding 'allauth/socialaccount/providers/salesforce/urls.py' adding 'allauth/socialaccount/providers/salesforce/views.py' adding 'allauth/socialaccount/providers/saml/__init__.py' adding 'allauth/socialaccount/providers/saml/conftest.py' adding 'allauth/socialaccount/providers/saml/provider.py' adding 'allauth/socialaccount/providers/saml/tests.py' adding 'allauth/socialaccount/providers/saml/urls.py' adding 'allauth/socialaccount/providers/saml/utils.py' adding 'allauth/socialaccount/providers/saml/views.py' adding 'allauth/socialaccount/providers/sharefile/__init__.py' adding 'allauth/socialaccount/providers/sharefile/provider.py' adding 'allauth/socialaccount/providers/sharefile/tests.py' adding 'allauth/socialaccount/providers/sharefile/urls.py' adding 'allauth/socialaccount/providers/sharefile/views.py' adding 'allauth/socialaccount/providers/shopify/__init__.py' adding 'allauth/socialaccount/providers/shopify/provider.py' adding 'allauth/socialaccount/providers/shopify/tests.py' adding 'allauth/socialaccount/providers/shopify/urls.py' adding 'allauth/socialaccount/providers/shopify/views.py' adding 'allauth/socialaccount/providers/slack/__init__.py' adding 'allauth/socialaccount/providers/slack/models.py' adding 'allauth/socialaccount/providers/slack/provider.py' adding 'allauth/socialaccount/providers/slack/tests.py' adding 'allauth/socialaccount/providers/slack/urls.py' adding 'allauth/socialaccount/providers/slack/views.py' adding 'allauth/socialaccount/providers/snapchat/__init__.py' adding 'allauth/socialaccount/providers/snapchat/constants.py' adding 'allauth/socialaccount/providers/snapchat/models.py' adding 'allauth/socialaccount/providers/snapchat/provider.py' adding 'allauth/socialaccount/providers/snapchat/tests.py' adding 'allauth/socialaccount/providers/snapchat/urls.py' adding 'allauth/socialaccount/providers/snapchat/views.py' adding 'allauth/socialaccount/providers/soundcloud/__init__.py' adding 'allauth/socialaccount/providers/soundcloud/provider.py' adding 'allauth/socialaccount/providers/soundcloud/tests.py' adding 'allauth/socialaccount/providers/soundcloud/urls.py' adding 'allauth/socialaccount/providers/soundcloud/views.py' adding 'allauth/socialaccount/providers/spotify/__init__.py' adding 'allauth/socialaccount/providers/spotify/provider.py' adding 'allauth/socialaccount/providers/spotify/tests.py' adding 'allauth/socialaccount/providers/spotify/urls.py' adding 'allauth/socialaccount/providers/spotify/views.py' adding 'allauth/socialaccount/providers/stackexchange/__init__.py' adding 'allauth/socialaccount/providers/stackexchange/provider.py' adding 'allauth/socialaccount/providers/stackexchange/tests.py' adding 'allauth/socialaccount/providers/stackexchange/urls.py' adding 'allauth/socialaccount/providers/stackexchange/views.py' adding 'allauth/socialaccount/providers/steam/__init__.py' adding 'allauth/socialaccount/providers/steam/models.py' adding 'allauth/socialaccount/providers/steam/provider.py' adding 'allauth/socialaccount/providers/steam/urls.py' adding 'allauth/socialaccount/providers/steam/views.py' adding 'allauth/socialaccount/providers/stocktwits/__init__.py' adding 'allauth/socialaccount/providers/stocktwits/provider.py' adding 'allauth/socialaccount/providers/stocktwits/tests.py' adding 'allauth/socialaccount/providers/stocktwits/urls.py' adding 'allauth/socialaccount/providers/stocktwits/views.py' adding 'allauth/socialaccount/providers/strava/__init__.py' adding 'allauth/socialaccount/providers/strava/provider.py' adding 'allauth/socialaccount/providers/strava/tests.py' adding 'allauth/socialaccount/providers/strava/urls.py' adding 'allauth/socialaccount/providers/strava/views.py' adding 'allauth/socialaccount/providers/stripe/__init__.py' adding 'allauth/socialaccount/providers/stripe/provider.py' adding 'allauth/socialaccount/providers/stripe/tests.py' adding 'allauth/socialaccount/providers/stripe/urls.py' adding 'allauth/socialaccount/providers/stripe/views.py' adding 'allauth/socialaccount/providers/telegram/__init__.py' adding 'allauth/socialaccount/providers/telegram/provider.py' adding 'allauth/socialaccount/providers/telegram/tests.py' adding 'allauth/socialaccount/providers/telegram/urls.py' adding 'allauth/socialaccount/providers/telegram/views.py' adding 'allauth/socialaccount/providers/telegram/static/telegram/js/telegram.js' adding 'allauth/socialaccount/providers/telegram/templates/telegram/callback.html' adding 'allauth/socialaccount/providers/tiktok/__init__.py' adding 'allauth/socialaccount/providers/tiktok/client.py' adding 'allauth/socialaccount/providers/tiktok/provider.py' adding 'allauth/socialaccount/providers/tiktok/scope.py' adding 'allauth/socialaccount/providers/tiktok/tests.py' adding 'allauth/socialaccount/providers/tiktok/urls.py' adding 'allauth/socialaccount/providers/tiktok/views.py' adding 'allauth/socialaccount/providers/trainingpeaks/__init__.py' adding 'allauth/socialaccount/providers/trainingpeaks/provider.py' adding 'allauth/socialaccount/providers/trainingpeaks/tests.py' adding 'allauth/socialaccount/providers/trainingpeaks/urls.py' adding 'allauth/socialaccount/providers/trainingpeaks/views.py' adding 'allauth/socialaccount/providers/trello/__init__.py' adding 'allauth/socialaccount/providers/trello/provider.py' adding 'allauth/socialaccount/providers/trello/tests.py' adding 'allauth/socialaccount/providers/trello/urls.py' adding 'allauth/socialaccount/providers/trello/views.py' adding 'allauth/socialaccount/providers/tumblr/__init__.py' adding 'allauth/socialaccount/providers/tumblr/provider.py' adding 'allauth/socialaccount/providers/tumblr/tests.py' adding 'allauth/socialaccount/providers/tumblr/urls.py' adding 'allauth/socialaccount/providers/tumblr/views.py' adding 'allauth/socialaccount/providers/twentythreeandme/__init__.py' adding 'allauth/socialaccount/providers/twentythreeandme/provider.py' adding 'allauth/socialaccount/providers/twentythreeandme/tests.py' adding 'allauth/socialaccount/providers/twentythreeandme/urls.py' adding 'allauth/socialaccount/providers/twentythreeandme/views.py' adding 'allauth/socialaccount/providers/twitch/__init__.py' adding 'allauth/socialaccount/providers/twitch/provider.py' adding 'allauth/socialaccount/providers/twitch/tests.py' adding 'allauth/socialaccount/providers/twitch/urls.py' adding 'allauth/socialaccount/providers/twitch/views.py' adding 'allauth/socialaccount/providers/twitter/__init__.py' adding 'allauth/socialaccount/providers/twitter/provider.py' adding 'allauth/socialaccount/providers/twitter/tests.py' adding 'allauth/socialaccount/providers/twitter/urls.py' adding 'allauth/socialaccount/providers/twitter/views.py' adding 'allauth/socialaccount/providers/twitter_oauth2/__init__.py' adding 'allauth/socialaccount/providers/twitter_oauth2/provider.py' adding 'allauth/socialaccount/providers/twitter_oauth2/tests.py' adding 'allauth/socialaccount/providers/twitter_oauth2/urls.py' adding 'allauth/socialaccount/providers/twitter_oauth2/views.py' adding 'allauth/socialaccount/providers/untappd/__init__.py' adding 'allauth/socialaccount/providers/untappd/client.py' adding 'allauth/socialaccount/providers/untappd/provider.py' adding 'allauth/socialaccount/providers/untappd/tests.py' adding 'allauth/socialaccount/providers/untappd/urls.py' adding 'allauth/socialaccount/providers/untappd/views.py' adding 'allauth/socialaccount/providers/vimeo/__init__.py' adding 'allauth/socialaccount/providers/vimeo/provider.py' adding 'allauth/socialaccount/providers/vimeo/tests.py' adding 'allauth/socialaccount/providers/vimeo/urls.py' adding 'allauth/socialaccount/providers/vimeo/views.py' adding 'allauth/socialaccount/providers/vimeo_oauth2/__init__.py' adding 'allauth/socialaccount/providers/vimeo_oauth2/models.py' adding 'allauth/socialaccount/providers/vimeo_oauth2/provider.py' adding 'allauth/socialaccount/providers/vimeo_oauth2/tests.py' adding 'allauth/socialaccount/providers/vimeo_oauth2/urls.py' adding 'allauth/socialaccount/providers/vimeo_oauth2/views.py' adding 'allauth/socialaccount/providers/vk/__init__.py' adding 'allauth/socialaccount/providers/vk/provider.py' adding 'allauth/socialaccount/providers/vk/tests.py' adding 'allauth/socialaccount/providers/vk/urls.py' adding 'allauth/socialaccount/providers/vk/views.py' adding 'allauth/socialaccount/providers/wahoo/__init__.py' adding 'allauth/socialaccount/providers/wahoo/provider.py' adding 'allauth/socialaccount/providers/wahoo/tests.py' adding 'allauth/socialaccount/providers/wahoo/urls.py' adding 'allauth/socialaccount/providers/wahoo/views.py' adding 'allauth/socialaccount/providers/weibo/__init__.py' adding 'allauth/socialaccount/providers/weibo/provider.py' adding 'allauth/socialaccount/providers/weibo/tests.py' adding 'allauth/socialaccount/providers/weibo/urls.py' adding 'allauth/socialaccount/providers/weibo/views.py' adding 'allauth/socialaccount/providers/weixin/__init__.py' adding 'allauth/socialaccount/providers/weixin/client.py' adding 'allauth/socialaccount/providers/weixin/provider.py' adding 'allauth/socialaccount/providers/weixin/tests.py' adding 'allauth/socialaccount/providers/weixin/urls.py' adding 'allauth/socialaccount/providers/weixin/views.py' adding 'allauth/socialaccount/providers/windowslive/__init__.py' adding 'allauth/socialaccount/providers/windowslive/provider.py' adding 'allauth/socialaccount/providers/windowslive/tests.py' adding 'allauth/socialaccount/providers/windowslive/urls.py' adding 'allauth/socialaccount/providers/windowslive/views.py' adding 'allauth/socialaccount/providers/xing/__init__.py' adding 'allauth/socialaccount/providers/xing/provider.py' adding 'allauth/socialaccount/providers/xing/tests.py' adding 'allauth/socialaccount/providers/xing/urls.py' adding 'allauth/socialaccount/providers/xing/views.py' adding 'allauth/socialaccount/providers/yahoo/__init__.py' adding 'allauth/socialaccount/providers/yahoo/models.py' adding 'allauth/socialaccount/providers/yahoo/provider.py' adding 'allauth/socialaccount/providers/yahoo/tests.py' adding 'allauth/socialaccount/providers/yahoo/urls.py' adding 'allauth/socialaccount/providers/yahoo/views.py' adding 'allauth/socialaccount/providers/yandex/__init__.py' adding 'allauth/socialaccount/providers/yandex/provider.py' adding 'allauth/socialaccount/providers/yandex/tests.py' adding 'allauth/socialaccount/providers/yandex/urls.py' adding 'allauth/socialaccount/providers/yandex/views.py' adding 'allauth/socialaccount/providers/ynab/__init__.py' adding 'allauth/socialaccount/providers/ynab/provider.py' adding 'allauth/socialaccount/providers/ynab/tests.py' adding 'allauth/socialaccount/providers/ynab/urls.py' adding 'allauth/socialaccount/providers/ynab/views.py' adding 'allauth/socialaccount/providers/zoho/__init__.py' adding 'allauth/socialaccount/providers/zoho/provider.py' adding 'allauth/socialaccount/providers/zoho/tests.py' adding 'allauth/socialaccount/providers/zoho/urls.py' adding 'allauth/socialaccount/providers/zoho/views.py' adding 'allauth/socialaccount/providers/zoom/__init__.py' adding 'allauth/socialaccount/providers/zoom/provider.py' adding 'allauth/socialaccount/providers/zoom/tests.py' adding 'allauth/socialaccount/providers/zoom/urls.py' adding 'allauth/socialaccount/providers/zoom/views.py' adding 'allauth/socialaccount/templatetags/__init__.py' adding 'allauth/socialaccount/templatetags/socialaccount.py' adding 'allauth/socialaccount/tests/__init__.py' adding 'allauth/socialaccount/tests/conftest.py' adding 'allauth/socialaccount/tests/test_adapter.py' adding 'allauth/socialaccount/tests/test_connect.py' adding 'allauth/socialaccount/tests/test_login.py' adding 'allauth/socialaccount/tests/test_registry.py' adding 'allauth/socialaccount/tests/test_signup.py' adding 'allauth/socialaccount/tests/test_utils.py' adding 'allauth/templates/account/account_inactive.html' adding 'allauth/templates/account/base_entrance.html' adding 'allauth/templates/account/base_manage.html' adding 'allauth/templates/account/base_manage_email.html' adding 'allauth/templates/account/base_manage_password.html' adding 'allauth/templates/account/base_reauthenticate.html' adding 'allauth/templates/account/confirm_email_verification_code.html' adding 'allauth/templates/account/confirm_login_code.html' adding 'allauth/templates/account/email.html' adding 'allauth/templates/account/email_change.html' adding 'allauth/templates/account/email_confirm.html' adding 'allauth/templates/account/login.html' adding 'allauth/templates/account/logout.html' adding 'allauth/templates/account/password_change.html' adding 'allauth/templates/account/password_reset.html' adding 'allauth/templates/account/password_reset_done.html' adding 'allauth/templates/account/password_reset_from_key.html' adding 'allauth/templates/account/password_reset_from_key_done.html' adding 'allauth/templates/account/password_set.html' adding 'allauth/templates/account/reauthenticate.html' adding 'allauth/templates/account/request_login_code.html' adding 'allauth/templates/account/signup.html' adding 'allauth/templates/account/signup_by_passkey.html' adding 'allauth/templates/account/signup_closed.html' adding 'allauth/templates/account/verification_sent.html' adding 'allauth/templates/account/verified_email_required.html' adding 'allauth/templates/account/email/account_already_exists_message.txt' adding 'allauth/templates/account/email/account_already_exists_subject.txt' adding 'allauth/templates/account/email/base_message.txt' adding 'allauth/templates/account/email/base_notification.txt' adding 'allauth/templates/account/email/email_changed_message.txt' adding 'allauth/templates/account/email/email_changed_subject.txt' adding 'allauth/templates/account/email/email_confirm_message.txt' adding 'allauth/templates/account/email/email_confirm_subject.txt' adding 'allauth/templates/account/email/email_confirmation_message.txt' adding 'allauth/templates/account/email/email_confirmation_signup_message.txt' adding 'allauth/templates/account/email/email_confirmation_signup_subject.txt' adding 'allauth/templates/account/email/email_confirmation_subject.txt' adding 'allauth/templates/account/email/email_deleted_message.txt' adding 'allauth/templates/account/email/email_deleted_subject.txt' adding 'allauth/templates/account/email/login_code_message.txt' adding 'allauth/templates/account/email/login_code_subject.txt' adding 'allauth/templates/account/email/password_changed_message.txt' adding 'allauth/templates/account/email/password_changed_subject.txt' adding 'allauth/templates/account/email/password_reset_key_message.txt' adding 'allauth/templates/account/email/password_reset_key_subject.txt' adding 'allauth/templates/account/email/password_reset_message.txt' adding 'allauth/templates/account/email/password_reset_subject.txt' adding 'allauth/templates/account/email/password_set_message.txt' adding 'allauth/templates/account/email/password_set_subject.txt' adding 'allauth/templates/account/email/unknown_account_message.txt' adding 'allauth/templates/account/email/unknown_account_subject.txt' adding 'allauth/templates/account/messages/cannot_delete_primary_email.txt' adding 'allauth/templates/account/messages/email_confirmation_failed.txt' adding 'allauth/templates/account/messages/email_confirmation_sent.txt' adding 'allauth/templates/account/messages/email_confirmed.txt' adding 'allauth/templates/account/messages/email_deleted.txt' adding 'allauth/templates/account/messages/logged_in.txt' adding 'allauth/templates/account/messages/logged_out.txt' adding 'allauth/templates/account/messages/login_code_sent.txt' adding 'allauth/templates/account/messages/password_changed.txt' adding 'allauth/templates/account/messages/password_set.txt' adding 'allauth/templates/account/messages/primary_email_set.txt' adding 'allauth/templates/account/messages/unverified_primary_email.txt' adding 'allauth/templates/account/snippets/already_logged_in.html' adding 'allauth/templates/account/snippets/warn_no_email.html' adding 'allauth/templates/allauth/elements/alert.html' adding 'allauth/templates/allauth/elements/badge.html' adding 'allauth/templates/allauth/elements/button.html' adding 'allauth/templates/allauth/elements/button_group.html' adding 'allauth/templates/allauth/elements/field.html' adding 'allauth/templates/allauth/elements/fields.html' adding 'allauth/templates/allauth/elements/form.html' adding 'allauth/templates/allauth/elements/h1.html' adding 'allauth/templates/allauth/elements/h2.html' adding 'allauth/templates/allauth/elements/hr.html' adding 'allauth/templates/allauth/elements/img.html' adding 'allauth/templates/allauth/elements/p.html' adding 'allauth/templates/allauth/elements/panel.html' adding 'allauth/templates/allauth/elements/provider.html' adding 'allauth/templates/allauth/elements/provider_list.html' adding 'allauth/templates/allauth/elements/table.html' adding 'allauth/templates/allauth/elements/tbody.html' adding 'allauth/templates/allauth/elements/td.html' adding 'allauth/templates/allauth/elements/th.html' adding 'allauth/templates/allauth/elements/thead.html' adding 'allauth/templates/allauth/elements/tr.html' adding 'allauth/templates/allauth/layouts/base.html' adding 'allauth/templates/allauth/layouts/entrance.html' adding 'allauth/templates/allauth/layouts/manage.html' adding 'allauth/templates/mfa/authenticate.html' adding 'allauth/templates/mfa/base_entrance.html' adding 'allauth/templates/mfa/base_manage.html' adding 'allauth/templates/mfa/index.html' adding 'allauth/templates/mfa/reauthenticate.html' adding 'allauth/templates/mfa/email/recovery_codes_generated_message.txt' adding 'allauth/templates/mfa/email/recovery_codes_generated_subject.txt' adding 'allauth/templates/mfa/email/totp_activated_message.txt' adding 'allauth/templates/mfa/email/totp_activated_subject.txt' adding 'allauth/templates/mfa/email/totp_deactivated_message.txt' adding 'allauth/templates/mfa/email/totp_deactivated_subject.txt' adding 'allauth/templates/mfa/email/webauthn_added_message.txt' adding 'allauth/templates/mfa/email/webauthn_added_subject.txt' adding 'allauth/templates/mfa/email/webauthn_removed_message.txt' adding 'allauth/templates/mfa/email/webauthn_removed_subject.txt' adding 'allauth/templates/mfa/messages/recovery_codes_generated.txt' adding 'allauth/templates/mfa/messages/totp_activated.txt' adding 'allauth/templates/mfa/messages/totp_deactivated.txt' adding 'allauth/templates/mfa/messages/webauthn_added.txt' adding 'allauth/templates/mfa/messages/webauthn_removed.txt' adding 'allauth/templates/mfa/recovery_codes/base.html' adding 'allauth/templates/mfa/recovery_codes/download.txt' adding 'allauth/templates/mfa/recovery_codes/generate.html' adding 'allauth/templates/mfa/recovery_codes/index.html' adding 'allauth/templates/mfa/totp/activate_form.html' adding 'allauth/templates/mfa/totp/base.html' adding 'allauth/templates/mfa/totp/deactivate_form.html' adding 'allauth/templates/mfa/webauthn/add_form.html' adding 'allauth/templates/mfa/webauthn/authenticator_confirm_delete.html' adding 'allauth/templates/mfa/webauthn/authenticator_list.html' adding 'allauth/templates/mfa/webauthn/base.html' adding 'allauth/templates/mfa/webauthn/edit_form.html' adding 'allauth/templates/mfa/webauthn/reauthenticate.html' adding 'allauth/templates/mfa/webauthn/signup_form.html' adding 'allauth/templates/mfa/webauthn/snippets/login_script.html' adding 'allauth/templates/mfa/webauthn/snippets/scripts.html' adding 'allauth/templates/openid/base.html' adding 'allauth/templates/openid/login.html' adding 'allauth/templates/socialaccount/authentication_error.html' adding 'allauth/templates/socialaccount/base_entrance.html' adding 'allauth/templates/socialaccount/base_manage.html' adding 'allauth/templates/socialaccount/connections.html' adding 'allauth/templates/socialaccount/login.html' adding 'allauth/templates/socialaccount/login_cancelled.html' adding 'allauth/templates/socialaccount/login_redirect.html' adding 'allauth/templates/socialaccount/signup.html' adding 'allauth/templates/socialaccount/email/account_connected_message.txt' adding 'allauth/templates/socialaccount/email/account_connected_subject.txt' adding 'allauth/templates/socialaccount/email/account_disconnected_message.txt' adding 'allauth/templates/socialaccount/email/account_disconnected_subject.txt' adding 'allauth/templates/socialaccount/messages/account_connected.txt' adding 'allauth/templates/socialaccount/messages/account_connected_other.txt' adding 'allauth/templates/socialaccount/messages/account_connected_updated.txt' adding 'allauth/templates/socialaccount/messages/account_disconnected.txt' adding 'allauth/templates/socialaccount/snippets/login.html' adding 'allauth/templates/socialaccount/snippets/login_extra.html' adding 'allauth/templates/socialaccount/snippets/provider_list.html' adding 'allauth/templates/tests/test_403_csrf.html' adding 'allauth/templates/usersessions/base_manage.html' adding 'allauth/templates/usersessions/usersession_list.html' adding 'allauth/templates/usersessions/messages/sessions_logged_out.txt' adding 'allauth/templatetags/__init__.py' adding 'allauth/templatetags/allauth.py' adding 'allauth/usersessions/__init__.py' adding 'allauth/usersessions/adapter.py' adding 'allauth/usersessions/admin.py' adding 'allauth/usersessions/app_settings.py' adding 'allauth/usersessions/apps.py' adding 'allauth/usersessions/forms.py' adding 'allauth/usersessions/middleware.py' adding 'allauth/usersessions/models.py' adding 'allauth/usersessions/signals.py' adding 'allauth/usersessions/urls.py' adding 'allauth/usersessions/views.py' adding 'allauth/usersessions/internal/__init__.py' adding 'allauth/usersessions/internal/flows/__init__.py' adding 'allauth/usersessions/internal/flows/sessions.py' adding 'allauth/usersessions/migrations/0001_initial.py' adding 'allauth/usersessions/migrations/__init__.py' adding 'allauth/usersessions/tests/__init__.py' adding 'allauth/usersessions/tests/test_middleware.py' adding 'allauth/usersessions/tests/test_views.py' adding 'django_allauth-65.3.0.dist-info/licenses/AUTHORS' adding 'django_allauth-65.3.0.dist-info/licenses/LICENSE' adding 'django_allauth-65.3.0.dist-info/METADATA' adding 'django_allauth-65.3.0.dist-info/WHEEL' adding 'django_allauth-65.3.0.dist-info/top_level.txt' adding 'django_allauth-65.3.0.dist-info/RECORD' removing build/bdist.linux-x86_64/wheel Building wheel for django-allauth (pyproject.toml): finished with status 'done' Created wheel for django-allauth: filename=django_allauth-65.3.0-py3-none-any.whl size=1290115 sha256=9d16f6cefdc37c94662c3e2bea0dd0b99288e6611e1464b85296088960d2a351 Stored in directory: /builddir/.cache/pip/wheels/06/23/9d/64e22a92542b121370e79280baee48893cc6e585a7562e43c4 Successfully built django-allauth + RPM_EC=0 ++ jobs -p + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.cvqYJD + umask 022 + cd /builddir/build/BUILD/python-django-allauth-65.3.0-build + '[' /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT '!=' / ']' + rm -rf /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT ++ dirname /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT + mkdir -p /builddir/build/BUILD/python-django-allauth-65.3.0-build + mkdir /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT + CFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + export CFLAGS + CXXFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + export CXXFLAGS + FFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + export FFLAGS + FCFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + export FCFLAGS + VALAFLAGS=-g + export VALAFLAGS + RUSTFLAGS='-Copt-level=3 -Cdebuginfo=2 -Ccodegen-units=1 -Cstrip=none -Cforce-frame-pointers=yes -Clink-arg=-specs=/usr/lib/rpm/redhat/redhat-package-notes --cap-lints=warn' + export RUSTFLAGS + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,pack-relative-relocs -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-hardened-ld-errors -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,--build-id=sha1 -specs=/usr/lib/rpm/redhat/redhat-package-notes ' + export LDFLAGS + LT_SYS_LIBRARY_PATH=/usr/lib64: + export LT_SYS_LIBRARY_PATH + CC=gcc + export CC + CXX=g++ + export CXX + cd django-allauth ++ ls /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/pyproject-wheeldir/django_allauth-65.3.0-py3-none-any.whl ++ xargs basename --multiple ++ sed -E 's/([^-]+)-([^-]+)-.+\.whl/\1==\2/' + specifier=django_allauth==65.3.0 + '[' -z django_allauth==65.3.0 ']' + TMPDIR=/builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir + /usr/bin/python3 -m pip install --root /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT --prefix /usr --no-deps --disable-pip-version-check --progress-bar off --verbose --ignore-installed --no-warn-script-location --no-index --no-cache-dir --find-links /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/pyproject-wheeldir django_allauth==65.3.0 Using pip 25.2 from /usr/lib/python3.14/site-packages/pip (python 3.14) Looking in links: /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/pyproject-wheeldir Processing ./pyproject-wheeldir/django_allauth-65.3.0-py3-none-any.whl Installing collected packages: django_allauth Successfully installed django_allauth-65.3.0 + '[' -d /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/bin ']' + rm -f /builddir/build/BUILD/python-django-allauth-65.3.0-build/python-django-allauth-65.3.0-5.fc43.x86_64-pyproject-ghost-distinfo + site_dirs=() + '[' -d /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages ']' + site_dirs+=("/usr/lib/python3.14/site-packages") + '[' /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib64/python3.14/site-packages '!=' /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages ']' + '[' -d /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib64/python3.14/site-packages ']' + for site_dir in ${site_dirs[@]} + for distinfo in /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT$site_dir/*.dist-info + echo '%ghost /usr/lib/python3.14/site-packages/django_allauth-65.3.0.dist-info' + sed -i s/pip/rpm/ /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/django_allauth-65.3.0.dist-info/INSTALLER + PYTHONPATH=/usr/lib/rpm/redhat + /usr/bin/python3 -B /usr/lib/rpm/redhat/pyproject_preprocess_record.py --buildroot /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT --record /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/django_allauth-65.3.0.dist-info/RECORD --output /builddir/build/BUILD/python-django-allauth-65.3.0-build/python-django-allauth-65.3.0-5.fc43.x86_64-pyproject-record + rm -fv /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/django_allauth-65.3.0.dist-info/RECORD removed '/builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/django_allauth-65.3.0.dist-info/RECORD' + rm -fv /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/django_allauth-65.3.0.dist-info/REQUESTED removed '/builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/django_allauth-65.3.0.dist-info/REQUESTED' ++ wc -l /builddir/build/BUILD/python-django-allauth-65.3.0-build/python-django-allauth-65.3.0-5.fc43.x86_64-pyproject-ghost-distinfo ++ cut -f1 '-d ' + lines=1 + '[' 1 -ne 1 ']' + RPM_FILES_ESCAPE=4.19 + /usr/bin/python3 /usr/lib/rpm/redhat/pyproject_save_files.py --output-files /builddir/build/BUILD/python-django-allauth-65.3.0-build/python-django-allauth-65.3.0-5.fc43.x86_64-pyproject-files --output-modules /builddir/build/BUILD/python-django-allauth-65.3.0-build/python-django-allauth-65.3.0-5.fc43.x86_64-pyproject-modules --buildroot /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT --sitelib /usr/lib/python3.14/site-packages --sitearch /usr/lib64/python3.14/site-packages --python-version 3.14 --pyproject-record /builddir/build/BUILD/python-django-allauth-65.3.0-build/python-django-allauth-65.3.0-5.fc43.x86_64-pyproject-record --prefix /usr allauth + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/redhat/brp-ldconfig + /usr/lib/rpm/brp-compress + /usr/lib/rpm/brp-strip /usr/bin/strip + /usr/lib/rpm/brp-strip-comment-note /usr/bin/strip /usr/bin/objdump + /usr/lib/rpm/redhat/brp-strip-lto /usr/bin/strip + /usr/lib/rpm/check-rpaths + /usr/lib/rpm/redhat/brp-mangle-shebangs + /usr/lib/rpm/brp-remove-la-files + /usr/lib/rpm/redhat/brp-python-rpm-in-distinfo + env /usr/lib/rpm/redhat/brp-python-bytecompile '' 1 0 -j4 Bytecompiling .py files below /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14 using python3.14 + /usr/lib/rpm/redhat/brp-python-hardlink + /usr/bin/add-determinism --brp -j4 /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/__pycache__/utils.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/__pycache__/ratelimit.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/__pycache__/utils.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/__pycache__/exceptions.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/__pycache__/decorators.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/__pycache__/app_settings.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/__pycache__/signals.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/__pycache__/forms.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/__pycache__/tests.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/__pycache__/adapter.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/__pycache__/middleware.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/__pycache__/conftest.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/__pycache__/apps.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/__pycache__/app_settings.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/__pycache__/admin.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/tests/__pycache__/test_views.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/tests/__pycache__/test_views.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/tests/__pycache__/test_middleware.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/tests/__pycache__/test_middleware.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/migrations/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/internal/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/migrations/__pycache__/0001_initial.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/internal/flows/__pycache__/sessions.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/__pycache__/tests.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/templatetags/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/usersessions/internal/flows/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/templatetags/__pycache__/allauth.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/signals.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/sessions.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/helpers.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/conftest.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/apps.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/forms.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/app_settings.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/models.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/adapter.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/models.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/app_settings.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/admin.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/tests/__pycache__/test_adapter.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/tests/__pycache__/test_adapter.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/tests/__pycache__/conftest.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/tests/__pycache__/test_signup.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/__pycache__/adapter.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/tests/__pycache__/test_signup.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/tests/__pycache__/test_registry.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/tests/__pycache__/test_login.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/tests/__pycache__/test_login.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/tests/__pycache__/test_utils.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/tests/__pycache__/test_connect.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/tests/__pycache__/__init__.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/tests/__pycache__/test_connect.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/templatetags/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/templatetags/__pycache__/socialaccount.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/zoom/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/zoom/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/zoom/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/zoho/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/zoho/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/zoom/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/zoho/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/zoho/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/zoho/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/zoom/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/tests/__pycache__/__init__.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/ynab/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/ynab/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/ynab/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/ynab/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/yandex/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/yandex/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/ynab/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/yandex/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/yandex/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/yahoo/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/yahoo/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/yahoo/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/yandex/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/yahoo/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/yahoo/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/yahoo/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/xing/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/xing/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/xing/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/xing/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/xing/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/windowslive/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/windowslive/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/windowslive/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/windowslive/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/weixin/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/weixin/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/weixin/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/windowslive/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/weixin/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/weixin/__pycache__/client.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/weixin/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/weibo/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/weibo/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/weibo/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/weibo/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/weibo/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/wahoo/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/wahoo/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/wahoo/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/wahoo/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vk/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/wahoo/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vk/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vk/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vk/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vimeo_oauth2/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vimeo_oauth2/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vimeo_oauth2/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vimeo_oauth2/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vk/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vimeo_oauth2/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vimeo_oauth2/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vimeo/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vimeo/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vimeo/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vimeo/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/vimeo/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/untappd/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/untappd/__pycache__/client.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/untappd/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/untappd/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/untappd/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/untappd/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twitter_oauth2/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twitter_oauth2/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twitter_oauth2/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twitter_oauth2/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twitter_oauth2/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twitter/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twitter/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twitter/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twitter/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twitter/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twitch/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twitch/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twitch/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twentythreeandme/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twitch/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twitch/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twentythreeandme/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twentythreeandme/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twentythreeandme/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/tumblr/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/tumblr/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/tumblr/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/tumblr/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/tumblr/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/trello/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/trello/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/trello/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/trello/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/trello/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/trainingpeaks/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/twentythreeandme/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/trainingpeaks/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/trainingpeaks/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/trainingpeaks/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/tiktok/__pycache__/client.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/tiktok/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/tiktok/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/tiktok/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/tiktok/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/tiktok/__pycache__/scope.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/tiktok/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/trainingpeaks/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/telegram/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/telegram/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/telegram/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/telegram/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/telegram/__pycache__/tests.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/telegram/__pycache__/tests.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/stripe/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/stripe/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/stripe/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/stripe/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/strava/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/strava/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/strava/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/strava/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/stocktwits/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/strava/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/stocktwits/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/stocktwits/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/stocktwits/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/steam/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/stocktwits/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/steam/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/steam/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/steam/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/stackexchange/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/stripe/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/stackexchange/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/stackexchange/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/stackexchange/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/stackexchange/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/spotify/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/spotify/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/spotify/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/spotify/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/soundcloud/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/soundcloud/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/spotify/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/soundcloud/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/soundcloud/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/snapchat/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/steam/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/soundcloud/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/snapchat/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/snapchat/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/snapchat/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/snapchat/__pycache__/constants.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/slack/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/snapchat/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/snapchat/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/slack/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/slack/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/slack/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/slack/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/slack/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/shopify/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/shopify/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/shopify/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/shopify/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/shopify/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/sharefile/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/sharefile/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/sharefile/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/sharefile/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/sharefile/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/saml/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/saml/__pycache__/utils.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/saml/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/saml/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/saml/__pycache__/tests.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/saml/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/salesforce/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/saml/__pycache__/conftest.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/salesforce/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/salesforce/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/salesforce/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/robinhood/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/robinhood/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/saml/__pycache__/tests.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/salesforce/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/robinhood/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/robinhood/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/reddit/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/reddit/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/reddit/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/robinhood/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/reddit/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/reddit/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/quickbooks/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/quickbooks/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/quickbooks/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/quickbooks/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/questrade/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/questrade/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/questrade/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/quickbooks/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/questrade/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/questrade/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/quickbooks/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/pocket/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/pocket/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/pocket/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/pocket/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/pocket/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/pinterest/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/pocket/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/pocket/__pycache__/client.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/pinterest/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/pinterest/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/pinterest/__pycache__/tests.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/pinterest/__pycache__/tests.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/pinterest/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/paypal/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/paypal/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/paypal/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/paypal/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/patreon/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/patreon/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/patreon/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/patreon/__pycache__/constants.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/patreon/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/patreon/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/paypal/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/orcid/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/patreon/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/orcid/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/orcid/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/orcid/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openstreetmap/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/orcid/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openstreetmap/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openstreetmap/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openstreetmap/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid_connect/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openstreetmap/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid_connect/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid_connect/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid_connect/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid_connect/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid/__pycache__/utils.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid/__pycache__/forms.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid/__pycache__/admin.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid/migrations/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid/__pycache__/tests.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid/migrations/__pycache__/0001_initial.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/okta/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/okta/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/okta/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/openid/__pycache__/tests.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/okta/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/odnoklassniki/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/odnoklassniki/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/okta/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/odnoklassniki/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/odnoklassniki/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/odnoklassniki/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/oauth2/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/oauth2/__pycache__/utils.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/oauth2/__pycache__/client.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/oauth2/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/oauth2/tests/__pycache__/test_views.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/oauth2/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/oauth2/tests/__pycache__/test_views.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/oauth2/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/oauth2/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/oauth/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/oauth/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/notion/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/oauth/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/oauth/__pycache__/client.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/notion/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/notion/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/notion/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/notion/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/notion/__pycache__/client.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/nextcloud/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/nextcloud/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/oauth/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/nextcloud/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/nextcloud/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/netiq/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/nextcloud/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/netiq/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/netiq/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/netiq/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/naver/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/naver/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/naver/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/naver/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/naver/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/miro/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/miro/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/miro/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/naver/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/miro/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/microsoft/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/miro/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/microsoft/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/microsoft/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/microsoft/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/meetup/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/microsoft/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/meetup/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/meetup/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/meetup/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/meetup/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/meetup/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/mediawiki/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/mediawiki/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/mediawiki/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/mediawiki/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/mailru/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/mailru/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/mailru/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/mediawiki/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/mailru/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/mailru/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/mailchimp/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/netiq/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/mailchimp/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/mailchimp/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/mailchimp/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/linkedin_oauth2/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/mailchimp/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/linkedin_oauth2/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/linkedin_oauth2/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/linkedin_oauth2/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/linkedin_oauth2/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/line/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/line/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/line/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/line/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/line/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/lichess/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/line/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/lichess/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/lichess/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/lemonldap/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/lichess/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/lichess/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/lemonldap/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/lemonldap/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/lemonldap/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/lemonldap/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/kakao/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/kakao/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/kakao/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/jupyterhub/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/kakao/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/kakao/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/kakao/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/jupyterhub/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/jupyterhub/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/instagram/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/instagram/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/instagram/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/jupyterhub/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/instagram/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/jupyterhub/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/instagram/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/hubspot/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/hubspot/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/hubspot/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/hubic/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/hubic/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/hubspot/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/hubspot/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/hubic/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/hubic/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/gumroad/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/hubic/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/gumroad/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/gumroad/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/gumroad/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/gumroad/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/google/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/google/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/google/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/globus/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/globus/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/globus/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/globus/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/google/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/globus/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/google/__pycache__/tests.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/gitlab/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/gitlab/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/gitlab/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/gitlab/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/github/__pycache__/tests.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/gitlab/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/github/__pycache__/tests.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/github/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/github/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/google/__pycache__/tests.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/gitea/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/gitea/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/github/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/gitea/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/gitea/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/fxa/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/github/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/fxa/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/gitea/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/fxa/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/fxa/__pycache__/constants.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/fxa/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/fxa/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/frontier/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/fxa/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/frontier/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/frontier/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/foursquare/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/foursquare/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/foursquare/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/frontier/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/foursquare/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/foursquare/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/flickr/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/flickr/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/flickr/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/flickr/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/fivehundredpx/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/flickr/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/fivehundredpx/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/fivehundredpx/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/fivehundredpx/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/fivehundredpx/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/figma/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/figma/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/fivehundredpx/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/figma/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/figma/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/figma/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/feishu/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/feishu/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/feishu/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/feishu/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/feishu/__pycache__/client.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/feishu/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/feedly/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/feedly/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/feedly/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/feedly/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/feedly/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/facebook/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/frontier/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/facebook/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/facebook/__pycache__/tests.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/facebook/__pycache__/flows.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/facebook/__pycache__/locale.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/facebook/__pycache__/constants.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/facebook/__pycache__/provider.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/facebook/__pycache__/forms.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/facebook/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/exist/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/facebook/__pycache__/tests.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/exist/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/exist/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/exist/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/evernote/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/exist/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/evernote/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/evernote/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/evernote/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/evernote/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/eveonline/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/eveonline/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/eveonline/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/eveonline/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/eventbrite/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/eventbrite/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/eveonline/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/eventbrite/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/eventbrite/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/edx/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/edx/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/edx/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/edx/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/eventbrite/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/edmodo/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/edmodo/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/edx/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/facebook/__pycache__/provider.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/edmodo/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/edmodo/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/edmodo/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dwolla/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dwolla/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dwolla/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dwolla/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dwolla/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dummy/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dummy/__pycache__/forms.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dummy/__pycache__/tests.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dummy/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dummy/__pycache__/tests.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dummy/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dummy/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dropbox/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dropbox/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dropbox/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dropbox/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/drip/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dropbox/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/drip/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dwolla/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/drip/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/drip/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/draugiem/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/drip/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/draugiem/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/draugiem/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/draugiem/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/doximity/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/doximity/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/doximity/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/doximity/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/doximity/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/draugiem/__pycache__/tests.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/douban/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/douban/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/douban/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/douban/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/disqus/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/disqus/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/douban/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/disqus/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/disqus/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/discord/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/disqus/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/discord/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/discord/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/discord/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dingtalk/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dingtalk/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dingtalk/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/discord/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dingtalk/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dingtalk/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/digitalocean/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dingtalk/__pycache__/client.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/digitalocean/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/digitalocean/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/digitalocean/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/digitalocean/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/daum/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/daum/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/daum/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/daum/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dataporten/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/daum/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dataporten/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/daum/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dataporten/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dataporten/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dataporten/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/draugiem/__pycache__/tests.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/dataporten/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/coinbase/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/coinbase/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/coinbase/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/coinbase/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/coinbase/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/clever/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/clever/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/clever/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/cilogon/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/clever/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/cilogon/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/cilogon/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/cilogon/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/box/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/box/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/cilogon/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/box/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/box/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/clever/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/bitly/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/bitly/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/bitly/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/bitly/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/bitly/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/bitbucket_oauth2/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/bitbucket_oauth2/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/bitbucket_oauth2/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/bitbucket_oauth2/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/battlenet/__pycache__/validators.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/battlenet/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/battlenet/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/bitbucket_oauth2/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/battlenet/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/battlenet/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/battlenet/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/battlenet/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/basecamp/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/basecamp/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/basecamp/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/basecamp/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/base/__pycache__/utils.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/base/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/basecamp/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/base/__pycache__/constants.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/base/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/baidu/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/baidu/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/baidu/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/baidu/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/authentiq/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/baidu/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/authentiq/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/box/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/authentiq/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/authentiq/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/base/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/auth0/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/auth0/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/auth0/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/auth0/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/auth0/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/atlassian/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/atlassian/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/atlassian/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/asana/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/authentiq/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/asana/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/asana/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/asana/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/asana/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/atlassian/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/atlassian/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/asana/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/apple/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/apple/__pycache__/tests.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/apple/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/apple/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/apple/__pycache__/tests.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/apple/__pycache__/apple_session.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/angellist/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/apple/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/angellist/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/angellist/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/angellist/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/amazon_cognito/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/apple/__pycache__/client.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/angellist/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/amazon_cognito/__pycache__/utils.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/amazon_cognito/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/amazon_cognito/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/amazon_cognito/__pycache__/tests.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/amazon/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/amazon/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/amazon/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/amazon_cognito/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/amazon/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/agave/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/amazon/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/agave/__pycache__/provider.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/agave/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/agave/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/agave/__pycache__/tests.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/migrations/__pycache__/0003_extra_data_default_dict.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/migrations/__pycache__/0002_token_max_lengths.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/migrations/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/migrations/__pycache__/0006_alter_socialaccount_extra_data.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/migrations/__pycache__/0005_socialtoken_nullable_app.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/migrations/__pycache__/0004_app_provider_id_settings.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/migrations/__pycache__/0001_initial.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/internal/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/internal/tests/__pycache__/test_jwtkit.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/internal/__pycache__/statekit.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/internal/__pycache__/jwtkit.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/internal/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/internal/tests/__pycache__/test_jwtkit.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/internal/tests/__pycache__/test_statekit.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/internal/tests/__pycache__/test_statekit.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/internal/flows/__pycache__/signup.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/internal/flows/__pycache__/signup.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/internal/flows/__pycache__/login.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/internal/flows/__pycache__/email_authentication.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/internal/flows/__pycache__/login.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/internal/flows/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/__pycache__/utils.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/internal/flows/__pycache__/connect.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/__pycache__/stages.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/__pycache__/signals.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/__pycache__/checks.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/socialaccount/providers/amazon_cognito/__pycache__/tests.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/__pycache__/admin.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/__pycache__/apps.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/webauthn/__pycache__/stages.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/webauthn/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/__pycache__/app_settings.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/webauthn/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/__pycache__/adapter.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/webauthn/__pycache__/forms.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/webauthn/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/webauthn/tests/__pycache__/test_views.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/webauthn/internal/__pycache__/flows.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/webauthn/tests/__pycache__/test_views.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/webauthn/internal/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/totp/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/webauthn/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/totp/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/totp/__pycache__/forms.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/totp/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/totp/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/totp/tests/__pycache__/test_unit.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/webauthn/internal/__pycache__/auth.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/totp/tests/__pycache__/test_unit.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/totp/internal/__pycache__/flows.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/totp/tests/__pycache__/test_views.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/totp/internal/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/recovery_codes/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/recovery_codes/__pycache__/forms.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/totp/tests/__pycache__/test_views.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/recovery_codes/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/recovery_codes/tests/__pycache__/test_views.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/recovery_codes/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/recovery_codes/tests/__pycache__/test_auth.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/recovery_codes/tests/__pycache__/test_views.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/recovery_codes/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/recovery_codes/tests/__pycache__/test_auth.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/totp/internal/__pycache__/auth.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/recovery_codes/internal/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/migrations/__pycache__/0001_initial.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/migrations/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/migrations/__pycache__/0003_authenticator_type_uniq.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/recovery_codes/internal/__pycache__/auth.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/migrations/__pycache__/0002_authenticator_timestamps.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/internal/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/internal/flows/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/recovery_codes/internal/__pycache__/auth.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/internal/flows/__pycache__/add.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/base/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/base/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/base/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/recovery_codes/internal/__pycache__/flows.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/base/tests/__pycache__/test_views.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/base/__pycache__/forms.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/base/internal/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/base/tests/__pycache__/test_views.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/base/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/mfa/base/internal/__pycache__/flows.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/__pycache__/constants.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/__pycache__/apps.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/__pycache__/adapter.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/__pycache__/conftest.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/usersessions/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/usersessions/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/__pycache__/app_settings.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/usersessions/__pycache__/inputs.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/usersessions/tests/__pycache__/test_views.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/usersessions/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/usersessions/tests/__pycache__/test_views.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/usersessions/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/usersessions/__pycache__/response.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/tokens/__pycache__/sessions.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/tokens/__pycache__/sessions.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/tokens/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/tokens/__pycache__/base.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/tests/__pycache__/test_tokens.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/tests/__pycache__/test_tokens.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/socialaccount/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/socialaccount/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/socialaccount/__pycache__/forms.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/socialaccount/__pycache__/internal.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/socialaccount/__pycache__/response.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/socialaccount/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/socialaccount/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/socialaccount/__pycache__/inputs.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/socialaccount/tests/__pycache__/test_inputs.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/socialaccount/tests/__pycache__/test_inputs.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/socialaccount/tests/__pycache__/test_views.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/mfa/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/mfa/__pycache__/response.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/socialaccount/tests/__pycache__/test_views.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/mfa/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/mfa/__pycache__/inputs.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/mfa/tests/__pycache__/test_webauthn.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/mfa/tests/__pycache__/test_views.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/mfa/tests/__pycache__/test_webauthn.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/mfa/tests/__pycache__/test_totp.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/mfa/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/mfa/tests/__pycache__/test_views.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/mfa/tests/__pycache__/test_recovery_codes.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/mfa/tests/__pycache__/test_totp.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/mfa/tests/__pycache__/test_recovery_codes.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/internal/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/internal/__pycache__/sessionkit.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/internal/__pycache__/authkit.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/internal/tests/__pycache__/test_authkit.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/internal/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/internal/__pycache__/decorators.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/internal/tests/__pycache__/test_authkit.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/internal/restkit/__pycache__/inputs.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/internal/restkit/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/internal/restkit/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/internal/restkit/__pycache__/response.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/base/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/base/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/base/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/base/tests/__pycache__/test_views.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/base/tests/__pycache__/test_views.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/base/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/__pycache__/response.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/base/__pycache__/response.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/mfa/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_session.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_session.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_reset_password.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_reset_password.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_login.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/__pycache__/inputs.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_reauthentication.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_reauthentication.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_signup.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_login_by_code.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_email_verification_by_code.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_signup.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_change_email.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_login_by_code.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_email_verification_by_code.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_login.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_email_verification.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_change_email.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_change_password.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_email_verification.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/core/__pycache__/context.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/core/__pycache__/exceptions.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/core/tests/__pycache__/test_ratelimit.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/core/tests/__pycache__/test_ratelimit.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/headless/account/tests/__pycache__/test_change_password.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/core/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/core/__pycache__/ratelimit.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/core/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/core/internal/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/core/internal/__pycache__/adapter.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/core/internal/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/core/internal/tests/__pycache__/test_httpkit.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/core/internal/__pycache__/httpkit.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/core/internal/tests/__pycache__/test_httpkit.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/urls.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/signals.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/reauthentication.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/utils.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/utils.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/stages.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/models.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/mixins.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/stages.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/middleware.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/managers.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/managers.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/decorators.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/admin.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/views.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/checks.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/authentication.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/auth_backends.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/apps.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/forms.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/forms.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/app_settings.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_utils.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/adapter.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_utils.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_security.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_security.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_signup.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_signup.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_logout.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_login_by_code.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_reset_password.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_login_by_code.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_reset_password.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_change_email.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_reauthentication.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_ratelimit.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_login.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_reauthentication.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_ratelimit.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_models.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_models.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_middleware.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_email_verification.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_middleware.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_login.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_email_verification.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_change_email.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_email_verification_by_code.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_decorators.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_email_verification_by_code.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_commands.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_auth_backends.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_decorators.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_change_password.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_change_password.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_ajax.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_ajax.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_adapter.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/templatetags/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/templatetags/__pycache__/account.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/tests/__pycache__/test_adapter.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/migrations/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/migrations/__pycache__/0002_email_max_length.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/migrations/__pycache__/0009_emailaddress_unique_primary_email.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/migrations/__pycache__/0001_initial.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/migrations/__pycache__/0006_emailaddress_lower.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/migrations/__pycache__/0007_emailaddress_idx_email.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/migrations/__pycache__/0005_emailaddress_idx_upper_email.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/migrations/__pycache__/0004_alter_emailaddress_drop_unique_email.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/migrations/__pycache__/0008_emailaddress_unique_primary_email_fixup.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/management/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/management/commands/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/migrations/__pycache__/0003_alter_emailaddress_create_unique_verified_email.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/__pycache__/decorators.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/management/commands/__pycache__/account_unsetmultipleprimaryemails.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/__pycache__/stagekit.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/flows/__pycache__/signup.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/flows/__pycache__/manage_email.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/flows/__pycache__/reauthentication.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/flows/__pycache__/logout.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/flows/__pycache__/manage_email.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/flows/__pycache__/email_verification_by_code.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/flows/__pycache__/login_by_code.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/flows/__pycache__/email_verification_by_code.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/flows/__pycache__/password_reset.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/flows/__pycache__/login_by_code.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/flows/__pycache__/login.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/flows/__pycache__/password_change.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/flows/__pycache__/__init__.cpython-314.opt-1.pyc: rewriting with normalized contents /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/flows/__pycache__/email_verification.cpython-314.opt-1.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/internal/flows/__pycache__/email_verification.cpython-314.pyc: replacing with normalized version /builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages/allauth/account/__pycache__/adapter.cpython-314.pyc: replacing with normalized version Scanned 507 directories and 3060 files, processed 1126 inodes, 1035 modified (170 replaced + 865 rewritten), 0 unsupported format, 0 errors Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.wXJHDZ + umask 022 + cd /builddir/build/BUILD/python-django-allauth-65.3.0-build + CFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + export CFLAGS + CXXFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + export CXXFLAGS + FFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + export FFLAGS + FCFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -I/usr/lib64/gfortran/modules ' + export FCFLAGS + VALAFLAGS=-g + export VALAFLAGS + RUSTFLAGS='-Copt-level=3 -Cdebuginfo=2 -Ccodegen-units=1 -Cstrip=none -Cforce-frame-pointers=yes -Clink-arg=-specs=/usr/lib/rpm/redhat/redhat-package-notes --cap-lints=warn' + export RUSTFLAGS + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,pack-relative-relocs -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-hardened-ld-errors -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,--build-id=sha1 -specs=/usr/lib/rpm/redhat/redhat-package-notes ' + export LDFLAGS + LT_SYS_LIBRARY_PATH=/usr/lib64: + export LT_SYS_LIBRARY_PATH + CC=gcc + export CC + CXX=g++ + export CXX + cd django-allauth + CFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-U_FORTIFY_SOURCE,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -mtls-dialect=gnu2 -fno-omit-frame-pointer -mno-omit-leaf-frame-pointer ' + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,pack-relative-relocs -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-hardened-ld-errors -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,--build-id=sha1 -specs=/usr/lib/rpm/redhat/redhat-package-notes ' + PATH=/builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/bin:/usr/bin:/bin:/usr/sbin:/sbin + PYTHONPATH=/builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib64/python3.14/site-packages:/builddir/build/BUILD/python-django-allauth-65.3.0-build/BUILDROOT/usr/lib/python3.14/site-packages + PYTHONDONTWRITEBYTECODE=1 + PYTEST_ADDOPTS=' --ignore=/builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/.pyproject-builddir' + PYTEST_XDIST_AUTO_NUM_WORKERS=4 + /usr/bin/pytest -v --deselect allauth/socialaccount/providers/openid/tests.py::OpenIDTests::test_login --deselect allauth/socialaccount/providers/openid/tests.py::OpenIDTests::test_login_with_extra_attributes /usr/lib/python3.14/site-packages/pytest_asyncio/plugin.py:211: PytestDeprecationWarning: The configuration option "asyncio_default_fixture_loop_scope" is unset. The event loop scope for asynchronous fixtures will default to the fixture caching scope. Future versions of pytest-asyncio will default the loop scope for asynchronous fixtures to function scope. Set the default fixture loop scope explicitly in order to avoid unexpected behavior in the future. Valid fixture loop scopes are: "function", "class", "module", "package", "session" warnings.warn(PytestDeprecationWarning(_DEFAULT_FIXTURE_LOOP_SCOPE_UNSET)) ============================= test session starts ============================== platform linux -- Python 3.14.0rc2, pytest-8.3.5, pluggy-1.6.0 -- /usr/bin/python3 cachedir: .pytest_cache django: version: 5.2.4, settings: tests.regular.settings (from ini) rootdir: /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth configfile: pytest.ini plugins: asyncio-1.1.0, django-4.9.0 asyncio: mode=Mode.STRICT, asyncio_default_fixture_loop_scope=None, asyncio_default_test_loop_scope=function collecting ... collected 1532 items / 2 deselected / 1530 selected allauth/account/tests/test_adapter.py::test_adapter_pre_login FAILED [ 0%] allauth/account/tests/test_ajax.py::test_ajax_headers[headers0-False] FAILED [ 0%] allauth/account/tests/test_ajax.py::test_ajax_headers[headers1-True] FAILED [ 0%] allauth/account/tests/test_ajax.py::test_ajax_headers[headers2-True] FAILED [ 0%] allauth/account/tests/test_ajax.py::test_ajax_password_reset FAILED [ 0%] allauth/account/tests/test_ajax.py::test_ajax_login_fail FAILED [ 0%] allauth/account/tests/test_ajax.py::test_ajax_login_success FAILED [ 0%] allauth/account/tests/test_auth_backends.py::AuthenticationBackendTests::test_auth_by_email PASSED [ 0%] allauth/account/tests/test_auth_backends.py::AuthenticationBackendTests::test_auth_by_username PASSED [ 0%] allauth/account/tests/test_auth_backends.py::AuthenticationBackendTests::test_auth_by_username_or_email PASSED [ 0%] allauth/account/tests/test_auth_backends.py::test_account_enumeration_timing_attack[email] PASSED [ 0%] allauth/account/tests/test_auth_backends.py::test_account_enumeration_timing_attack[username] PASSED [ 0%] allauth/account/tests/test_auth_backends.py::test_account_enumeration_timing_attack[username_email] PASSED [ 0%] allauth/account/tests/test_change_email.py::test_ajax_get FAILED [ 0%] allauth/account/tests/test_change_email.py::test_ajax_add FAILED [ 0%] allauth/account/tests/test_change_email.py::test_ajax_add_invalid FAILED [ 1%] allauth/account/tests/test_change_email.py::test_ajax_remove_primary FAILED [ 1%] allauth/account/tests/test_change_email.py::test_remove_secondary FAILED [ 1%] allauth/account/tests/test_change_email.py::test_set_primary_unverified FAILED [ 1%] allauth/account/tests/test_change_email.py::test_set_primary FAILED [ 1%] allauth/account/tests/test_change_email.py::test_verify FAILED [ 1%] allauth/account/tests/test_change_email.py::test_verify_unknown_email FAILED [ 1%] allauth/account/tests/test_change_email.py::test_add_with_two_limiter FAILED [ 1%] allauth/account/tests/test_change_email.py::test_add_with_none_limiter FAILED [ 1%] allauth/account/tests/test_change_email.py::test_add_with_zero_limiter FAILED [ 1%] allauth/account/tests/test_change_email.py::test_set_email_as_primary_doesnt_override_existing_changes_on_the_user[True] PASSED [ 1%] allauth/account/tests/test_change_email.py::test_set_email_as_primary_doesnt_override_existing_changes_on_the_user[False] PASSED [ 1%] allauth/account/tests/test_change_email.py::test_delete_email_changes_user_email FAILED [ 1%] allauth/account/tests/test_change_email.py::test_delete_email_wipes_user_email FAILED [ 1%] allauth/account/tests/test_change_email.py::test_change_email FAILED [ 1%] allauth/account/tests/test_change_email.py::test_add FAILED [ 2%] allauth/account/tests/test_change_email.py::test_add_with_reauthentication FAILED [ 2%] allauth/account/tests/test_change_email.py::test_add_not_allowed[False] FAILED [ 2%] allauth/account/tests/test_change_email.py::test_add_not_allowed[True] FAILED [ 2%] allauth/account/tests/test_change_email.py::test_add_not_allowed[strict] FAILED [ 2%] allauth/account/tests/test_change_email.py::test_remove_email[email-pri@ma.il-secondary_emails0-pri@ma.il-False] FAILED [ 2%] allauth/account/tests/test_change_email.py::test_remove_email[email-pri@ma.il-secondary_emails1-sec@ma.il-True] FAILED [ 2%] allauth/account/tests/test_change_email.py::test_remove_email[email-pri@ma.il-secondary_emails2-pri@ma.il-False] FAILED [ 2%] allauth/account/tests/test_change_email.py::test_remove_email[username-pri@ma.il-secondary_emails3-pri@ma.il-False] FAILED [ 2%] allauth/account/tests/test_change_email.py::test_remove_email[username-pri@ma.il-secondary_emails4-sec@ma.il-True] FAILED [ 2%] allauth/account/tests/test_change_email.py::test_remove_email[username-pri@ma.il-secondary_emails5-pri@ma.il-True] FAILED [ 2%] allauth/account/tests/test_change_email.py::test_remove_email[username_email-pri@ma.il-secondary_emails6-pri@ma.il-False] FAILED [ 2%] allauth/account/tests/test_change_email.py::test_remove_email[username_email-pri@ma.il-secondary_emails7-sec@ma.il-True] FAILED [ 2%] allauth/account/tests/test_change_email.py::test_remove_email[username_email-pri@ma.il-secondary_emails8-pri@ma.il-True] FAILED [ 2%] allauth/account/tests/test_change_email.py::test_dont_lookup_invalid_email[valid@email.org-True] FAILED [ 2%] allauth/account/tests/test_change_email.py::test_dont_lookup_invalid_email[not-an-email-False] FAILED [ 3%] allauth/account/tests/test_change_email.py::test_add_requires_reauthentication FAILED [ 3%] allauth/account/tests/test_change_email.py::test_remove_requires_reauthentication FAILED [ 3%] allauth/account/tests/test_change_email.py::test_set_primary_requires_reauthentication FAILED [ 3%] allauth/account/tests/test_change_password.py::test_change_unusable_password_redirects_to_set FAILED [ 3%] allauth/account/tests/test_change_password.py::test_set_usable_password_redirects_to_change FAILED [ 3%] allauth/account/tests/test_change_password.py::test_set_password[False--redirect_chain0] FAILED [ 3%] allauth/account/tests/test_change_password.py::test_set_password[False-/foo-redirect_chain1] FAILED [ 3%] allauth/account/tests/test_change_password.py::test_set_password[True--redirect_chain2] FAILED [ 3%] allauth/account/tests/test_change_password.py::test_set_password[True-/foo-redirect_chain3] FAILED [ 3%] allauth/account/tests/test_change_password.py::test_change_password[False--redirect_chain0] FAILED [ 3%] allauth/account/tests/test_change_password.py::test_change_password[False-/foo-redirect_chain1] FAILED [ 3%] allauth/account/tests/test_change_password.py::test_change_password[True--redirect_chain2] FAILED [ 3%] allauth/account/tests/test_change_password.py::test_change_password[True-/foo-redirect_chain3] FAILED [ 3%] allauth/account/tests/test_commands.py::test_unset_multipleprimaryemails PASSED [ 3%] allauth/account/tests/test_decorators.py::test_verified_email_required FAILED [ 3%] allauth/account/tests/test_decorators.py::test_secure_admin_login_denies_regular_users FAILED [ 4%] allauth/account/tests/test_decorators.py::test_secure_admin_login_passes_staff FAILED [ 4%] allauth/account/tests/test_email_verification.py::test_login_on_verification[None--/accounts/profile/] FAILED [ 4%] allauth/account/tests/test_email_verification.py::test_login_on_verification[None-?next=/foo-/foo] FAILED [ 4%] allauth/account/tests/test_email_verification.py::test_login_on_verification[allauth.account.tests.test_email_verification.TestEmailVerificationAdapter--/foobar] FAILED [ 4%] allauth/account/tests/test_email_verification.py::test_email_verification_failed FAILED [ 4%] allauth/account/tests/test_email_verification.py::test_email_verification_mandatory FAILED [ 4%] allauth/account/tests/test_email_verification.py::test_optional_email_verification FAILED [ 4%] allauth/account/tests/test_email_verification.py::test_email_verification_hmac FAILED [ 4%] allauth/account/tests/test_email_verification.py::test_email_verification_hmac_timeout FAILED [ 4%] allauth/account/tests/test_email_verification.py::test_verify_email_with_another_user_logged_in FAILED [ 4%] allauth/account/tests/test_email_verification.py::test_verify_email_with_same_user_logged_in FAILED [ 4%] allauth/account/tests/test_email_verification.py::test_verify_logs_out_user FAILED [ 4%] allauth/account/tests/test_email_verification.py::test_email_verification_login_redirect FAILED [ 4%] allauth/account/tests/test_email_verification.py::test_email_verification_redirect_url FAILED [ 4%] allauth/account/tests/test_email_verification_by_code.py::test_signup[-/accounts/profile/] FAILED [ 5%] allauth/account/tests/test_email_verification_by_code.py::test_signup[?next=/foo-/foo] FAILED [ 5%] allauth/account/tests/test_email_verification_by_code.py::test_signup_prevent_enumeration FAILED [ 5%] allauth/account/tests/test_email_verification_by_code.py::test_add_or_change_email[False] FAILED [ 5%] allauth/account/tests/test_email_verification_by_code.py::test_add_or_change_email[True] FAILED [ 5%] allauth/account/tests/test_email_verification_by_code.py::test_email_verification_login_redirect FAILED [ 5%] allauth/account/tests/test_email_verification_by_code.py::test_email_verification_rate_limits FAILED [ 5%] allauth/account/tests/test_login.py::LoginTests::test_account_authenticated_login_redirects_is_false FAILED [ 5%] allauth/account/tests/test_login.py::LoginTests::test_ajax_password_change FAILED [ 5%] allauth/account/tests/test_login.py::LoginTests::test_login_failed_attempts_exceeded FAILED [ 5%] allauth/account/tests/test_login.py::LoginTests::test_login_failed_attempts_exceeded_cleared_on_password_reset FAILED [ 5%] allauth/account/tests/test_login.py::LoginTests::test_login_inactive_account FAILED [ 5%] allauth/account/tests/test_login.py::LoginTests::test_login_unverified_account_mandatory FAILED [ 5%] allauth/account/tests/test_login.py::LoginTests::test_login_unverified_account_optional FAILED [ 5%] allauth/account/tests/test_login.py::LoginTests::test_login_using_unverified_email_address_is_prohibited FAILED [ 5%] allauth/account/tests/test_login.py::LoginTests::test_redirect_when_authenticated FAILED [ 6%] allauth/account/tests/test_login.py::LoginTests::test_username_containing_at FAILED [ 6%] allauth/account/tests/test_login.py::test_login_password_forgotten_link_not_present PASSED [ 6%] allauth/account/tests/test_login.py::test_login_password_forgotten_link_present FAILED [ 6%] allauth/account/tests/test_login.py::test_login_while_authenticated FAILED [ 6%] allauth/account/tests/test_login.py::test_login_page FAILED [ 6%] allauth/account/tests/test_login_by_code.py::test_login_by_code FAILED [ 6%] allauth/account/tests/test_login_by_code.py::test_login_by_code_max_attempts FAILED [ 6%] allauth/account/tests/test_login_by_code.py::test_login_by_code_unknown_user FAILED [ 6%] allauth/account/tests/test_login_by_code.py::test_login_by_code_required[True-True] FAILED [ 6%] allauth/account/tests/test_login_by_code.py::test_login_by_code_required[setting1-True] FAILED [ 6%] allauth/account/tests/test_login_by_code.py::test_login_by_code_required[setting2-False] FAILED [ 6%] allauth/account/tests/test_login_by_code.py::test_login_by_code_redirect FAILED [ 6%] allauth/account/tests/test_logout.py::LogoutTests::test_logout_view_on_get FAILED [ 6%] allauth/account/tests/test_logout.py::LogoutTests::test_logout_view_on_post FAILED [ 6%] allauth/account/tests/test_models.py::test_add_new_email FAILED [ 6%] allauth/account/tests/test_ratelimit.py::test_case_insensitive_password_reset FAILED [ 7%] allauth/account/tests/test_reauthentication.py::test_user_with_mfa_only[False-True-expected_method_urlnames0] FAILED [ 7%] allauth/account/tests/test_reauthentication.py::test_user_with_mfa_only[True-True-expected_method_urlnames1] FAILED [ 7%] allauth/account/tests/test_reauthentication.py::test_user_with_mfa_only[True-False-expected_method_urlnames2] FAILED [ 7%] allauth/account/tests/test_reauthentication.py::test_reauthentication FAILED [ 7%] allauth/account/tests/test_reset_password.py::test_reset_password_unknown_account FAILED [ 7%] allauth/account/tests/test_reset_password.py::test_reset_password_unknown_account_disabled FAILED [ 7%] allauth/account/tests/test_reset_password.py::test_reset_password_next_url[-expected_location0] FAILED [ 7%] allauth/account/tests/test_reset_password.py::test_reset_password_next_url[?next=/foo-/foo] FAILED [ 7%] allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_password_forgotten_no_username_hint FAILED [ 7%] allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_password_forgotten_username_hint FAILED [ 7%] allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_password_reset_ACCOUNT_LOGIN_ON_PASSWORD_RESET FAILED [ 7%] allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_password_reset_flow_with_another_user_logged_in FAILED [ 7%] allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_password_reset_flow_with_email_changed FAILED [ 7%] allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_password_reset_flow_with_empty_session FAILED [ 7%] allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_password_reset_get FAILED [ 8%] allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_set_password_not_allowed FAILED [ 8%] allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_user_email_not_sent_inactive_user PASSED [ 8%] allauth/account/tests/test_reset_password.py::test_password_reset_flow FAILED [ 8%] allauth/account/tests/test_reset_password.py::test_reset_password_from_key_next_url[None-expected_location0] FAILED [ 8%] allauth/account/tests/test_reset_password.py::test_reset_password_from_key_next_url[/foo-/foo] FAILED [ 8%] allauth/account/tests/test_security.py::test_user_email_unicode_collision FAILED [ 8%] allauth/account/tests/test_security.py::test_user_email_domain_unicode_collision FAILED [ 8%] allauth/account/tests/test_security.py::test_user_email_unicode_collision_nonexistent PASSED [ 8%] allauth/account/tests/test_security.py::test_user_email_domain_unicode_collision_nonexistent PASSED [ 8%] allauth/account/tests/test_signup.py::CustomSignupFormTests::test_custom_form_field_order PASSED [ 8%] allauth/account/tests/test_signup.py::CustomSignupFormTests::test_user_class_attribute PASSED [ 8%] allauth/account/tests/test_signup.py::BaseSignupFormTests::test_username_in_blacklist PASSED [ 8%] allauth/account/tests/test_signup.py::BaseSignupFormTests::test_username_maxlength PASSED [ 8%] allauth/account/tests/test_signup.py::BaseSignupFormTests::test_username_not_in_blacklist PASSED [ 8%] allauth/account/tests/test_signup.py::test_signup_email_verification PASSED [ 9%] allauth/account/tests/test_signup.py::SignupTests::test_django_password_validation FAILED [ 9%] allauth/account/tests/test_signup.py::SignupTests::test_signup_email_twice FAILED [ 9%] allauth/account/tests/test_signup.py::SignupTests::test_signup_other_email_verified_externally FAILED [ 9%] allauth/account/tests/test_signup.py::SignupTests::test_signup_password_twice_form_error FAILED [ 9%] allauth/account/tests/test_signup.py::SignupTests::test_signup_same_email_verified_externally FAILED [ 9%] allauth/account/tests/test_signup.py::test_prevent_enumeration_with_mandatory_verification FAILED [ 9%] allauth/account/tests/test_signup.py::test_prevent_enumeration_off FAILED [ 9%] allauth/account/tests/test_signup.py::test_prevent_enumeration_strictly FAILED [ 9%] allauth/account/tests/test_signup.py::test_prevent_enumeration_on FAILED [ 9%] allauth/account/tests/test_signup.py::test_get_initial_with_valid_email FAILED [ 9%] allauth/account/tests/test_signup.py::test_signup_user_model_no_email FAILED [ 9%] allauth/account/tests/test_signup.py::test_email_lower_case FAILED [ 9%] allauth/account/tests/test_signup.py::test_does_not_create_user_when_honeypot_filled_out FAILED [ 9%] allauth/account/tests/test_signup.py::test_create_user_when_honeypot_not_filled_out FAILED [ 9%] allauth/account/tests/test_utils.py::UtilsTests::test_email_escaping FAILED [ 10%] allauth/account/tests/test_utils.py::UtilsTests::test_is_safe_url_no_wildcard PASSED [ 10%] allauth/account/tests/test_utils.py::UtilsTests::test_is_safe_url_relative_path PASSED [ 10%] allauth/account/tests/test_utils.py::UtilsTests::test_is_safe_url_wildcard PASSED [ 10%] allauth/account/tests/test_utils.py::UtilsTests::test_message_escaping PASSED [ 10%] allauth/account/tests/test_utils.py::UtilsTests::test_pk_to_url_string_identifies_UUID_as_stringlike PASSED [ 10%] allauth/account/tests/test_utils.py::UtilsTests::test_url_str_to_pk_identifies_UUID_as_stringlike PASSED [ 10%] allauth/account/tests/test_utils.py::UtilsTests::test_user_display PASSED [ 10%] allauth/account/tests/test_utils.py::UtilsTests::test_username_case_preserved PASSED [ 10%] allauth/account/tests/test_utils.py::UtilsTests::test_username_lower_cased PASSED [ 10%] allauth/account/tests/test_utils.py::UtilsTests::test_username_validator PASSED [ 10%] allauth/account/tests/test_utils.py::test_redirect_noreversematch FAILED [ 10%] allauth/headless/account/tests/test_change_email.py::test_list_email[app] FAILED [ 10%] allauth/headless/account/tests/test_change_email.py::test_list_email[browser] FAILED [ 10%] allauth/headless/account/tests/test_change_email.py::test_remove_email[app] FAILED [ 10%] allauth/headless/account/tests/test_change_email.py::test_remove_email[browser] FAILED [ 10%] allauth/headless/account/tests/test_change_email.py::test_add_email[app] FAILED [ 11%] allauth/headless/account/tests/test_change_email.py::test_add_email[browser] FAILED [ 11%] allauth/headless/account/tests/test_change_email.py::test_change_primary[app] FAILED [ 11%] allauth/headless/account/tests/test_change_email.py::test_change_primary[browser] FAILED [ 11%] allauth/headless/account/tests/test_change_email.py::test_resend_verification[app] FAILED [ 11%] allauth/headless/account/tests/test_change_email.py::test_resend_verification[browser] FAILED [ 11%] allauth/headless/account/tests/test_change_email.py::test_email_rate_limit[app] FAILED [ 11%] allauth/headless/account/tests/test_change_email.py::test_email_rate_limit[browser] FAILED [ 11%] allauth/headless/account/tests/test_change_email.py::test_resend_verification_rate_limit[app] FAILED [ 11%] allauth/headless/account/tests/test_change_email.py::test_resend_verification_rate_limit[browser] FAILED [ 11%] allauth/headless/account/tests/test_change_password.py::test_change_password[app-True-request_data0-response_data0-400] FAILED [ 11%] allauth/headless/account/tests/test_change_password.py::test_change_password[app-True-request_data1-response_data1-200] FAILED [ 11%] allauth/headless/account/tests/test_change_password.py::test_change_password[app-True-request_data2-response_data2-400] FAILED [ 11%] allauth/headless/account/tests/test_change_password.py::test_change_password[app-True-request_data3-response_data3-400] FAILED [ 11%] allauth/headless/account/tests/test_change_password.py::test_change_password[app-True-request_data4-response_data4-400] FAILED [ 11%] allauth/headless/account/tests/test_change_password.py::test_change_password[app-True-request_data5-response_data5-400] FAILED [ 12%] allauth/headless/account/tests/test_change_password.py::test_change_password[app-False-request_data6-response_data6-200] FAILED [ 12%] allauth/headless/account/tests/test_change_password.py::test_change_password[app-False-request_data7-response_data7-200] FAILED [ 12%] allauth/headless/account/tests/test_change_password.py::test_change_password[browser-True-request_data0-response_data0-400] FAILED [ 12%] allauth/headless/account/tests/test_change_password.py::test_change_password[browser-True-request_data1-response_data1-200] FAILED [ 12%] allauth/headless/account/tests/test_change_password.py::test_change_password[browser-True-request_data2-response_data2-400] FAILED [ 12%] allauth/headless/account/tests/test_change_password.py::test_change_password[browser-True-request_data3-response_data3-400] FAILED [ 12%] allauth/headless/account/tests/test_change_password.py::test_change_password[browser-True-request_data4-response_data4-400] FAILED [ 12%] allauth/headless/account/tests/test_change_password.py::test_change_password[browser-True-request_data5-response_data5-400] FAILED [ 12%] allauth/headless/account/tests/test_change_password.py::test_change_password[browser-False-request_data6-response_data6-200] FAILED [ 12%] allauth/headless/account/tests/test_change_password.py::test_change_password[browser-False-request_data7-response_data7-200] FAILED [ 12%] allauth/headless/account/tests/test_change_password.py::test_change_password_rate_limit[app] FAILED [ 12%] allauth/headless/account/tests/test_change_password.py::test_change_password_rate_limit[browser] FAILED [ 12%] allauth/headless/account/tests/test_email_verification.py::test_verify_email_other_user[app] FAILED [ 12%] allauth/headless/account/tests/test_email_verification.py::test_verify_email_other_user[browser] FAILED [ 12%] allauth/headless/account/tests/test_email_verification.py::test_auth_unverified_email[app] FAILED [ 13%] allauth/headless/account/tests/test_email_verification.py::test_auth_unverified_email[browser] FAILED [ 13%] allauth/headless/account/tests/test_email_verification.py::test_verify_email_bad_key[app] FAILED [ 13%] allauth/headless/account/tests/test_email_verification.py::test_verify_email_bad_key[browser] FAILED [ 13%] allauth/headless/account/tests/test_email_verification_by_code.py::test_email_verification_rate_limits_login[app] FAILED [ 13%] allauth/headless/account/tests/test_email_verification_by_code.py::test_email_verification_rate_limits_login[browser] FAILED [ 13%] allauth/headless/account/tests/test_email_verification_by_code.py::test_email_verification_rate_limits_submitting_codes[app-GET] FAILED [ 13%] allauth/headless/account/tests/test_email_verification_by_code.py::test_email_verification_rate_limits_submitting_codes[app-POST] FAILED [ 13%] allauth/headless/account/tests/test_email_verification_by_code.py::test_email_verification_rate_limits_submitting_codes[browser-GET] FAILED [ 13%] allauth/headless/account/tests/test_email_verification_by_code.py::test_email_verification_rate_limits_submitting_codes[browser-POST] FAILED [ 13%] allauth/headless/account/tests/test_login.py::test_auth_password_bad_password[app] FAILED [ 13%] allauth/headless/account/tests/test_login.py::test_auth_password_bad_password[browser] FAILED [ 13%] allauth/headless/account/tests/test_login.py::test_auth_password_success[app] FAILED [ 13%] allauth/headless/account/tests/test_login.py::test_auth_password_success[browser] FAILED [ 13%] allauth/headless/account/tests/test_login.py::test_auth_password_user_inactive[app-False-401] FAILED [ 13%] allauth/headless/account/tests/test_login.py::test_auth_password_user_inactive[app-True-200] FAILED [ 13%] allauth/headless/account/tests/test_login.py::test_auth_password_user_inactive[browser-False-401] FAILED [ 14%] allauth/headless/account/tests/test_login.py::test_auth_password_user_inactive[browser-True-200] FAILED [ 14%] allauth/headless/account/tests/test_login.py::test_login_failed_rate_limit[app] FAILED [ 14%] allauth/headless/account/tests/test_login.py::test_login_failed_rate_limit[browser] FAILED [ 14%] allauth/headless/account/tests/test_login.py::test_login_rate_limit[app] FAILED [ 14%] allauth/headless/account/tests/test_login.py::test_login_rate_limit[browser] FAILED [ 14%] allauth/headless/account/tests/test_login.py::test_login_already_logged_in[app] FAILED [ 14%] allauth/headless/account/tests/test_login.py::test_login_already_logged_in[browser] FAILED [ 14%] allauth/headless/account/tests/test_login_by_code.py::test_login_by_code[app] FAILED [ 14%] allauth/headless/account/tests/test_login_by_code.py::test_login_by_code[browser] FAILED [ 14%] allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_rate_limit[app] FAILED [ 14%] allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_rate_limit[browser] FAILED [ 14%] allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_max_attemps[app] FAILED [ 14%] allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_max_attemps[browser] FAILED [ 14%] allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_required[app] FAILED [ 14%] allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_required[browser] FAILED [ 15%] allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_expired[app] FAILED [ 15%] allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_expired[browser] FAILED [ 15%] allauth/headless/account/tests/test_reauthentication.py::test_reauthenticate[app] FAILED [ 15%] allauth/headless/account/tests/test_reauthentication.py::test_reauthenticate[browser] FAILED [ 15%] allauth/headless/account/tests/test_reauthentication.py::test_reauthenticate_rate_limit[app] FAILED [ 15%] allauth/headless/account/tests/test_reauthentication.py::test_reauthenticate_rate_limit[browser] FAILED [ 15%] allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow[app] FAILED [ 15%] allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow[browser] FAILED [ 15%] allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow_unknown_user[app] FAILED [ 15%] allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow_unknown_user[browser] FAILED [ 15%] allauth/headless/account/tests/test_reset_password.py::test_reset_password_rate_limit[app] FAILED [ 15%] allauth/headless/account/tests/test_reset_password.py::test_reset_password_rate_limit[browser] FAILED [ 15%] allauth/headless/account/tests/test_reset_password.py::test_password_reset_key_rate_limit[app] FAILED [ 15%] allauth/headless/account/tests/test_reset_password.py::test_password_reset_key_rate_limit[browser] FAILED [ 15%] allauth/headless/account/tests/test_session.py::test_app_session_gone FAILED [ 16%] allauth/headless/account/tests/test_session.py::test_logout[app] FAILED [ 16%] allauth/headless/account/tests/test_session.py::test_logout[browser] FAILED [ 16%] allauth/headless/account/tests/test_session.py::test_logout_no_token FAILED [ 16%] allauth/headless/account/tests/test_signup.py::test_signup[app] FAILED [ 16%] allauth/headless/account/tests/test_signup.py::test_signup[browser] FAILED [ 16%] allauth/headless/account/tests/test_signup.py::test_signup_with_email_verification[app] FAILED [ 16%] allauth/headless/account/tests/test_signup.py::test_signup_with_email_verification[browser] FAILED [ 16%] allauth/headless/account/tests/test_signup.py::test_signup_prevent_enumeration[app] FAILED [ 16%] allauth/headless/account/tests/test_signup.py::test_signup_prevent_enumeration[browser] FAILED [ 16%] allauth/headless/account/tests/test_signup.py::test_signup_rate_limit[app] FAILED [ 16%] allauth/headless/account/tests/test_signup.py::test_signup_rate_limit[browser] FAILED [ 16%] allauth/headless/account/tests/test_signup.py::test_signup_closed[app] FAILED [ 16%] allauth/headless/account/tests/test_signup.py::test_signup_closed[browser] FAILED [ 16%] allauth/headless/account/tests/test_signup.py::test_signup_while_logged_in[app] FAILED [ 16%] allauth/headless/account/tests/test_signup.py::test_signup_while_logged_in[browser] FAILED [ 16%] allauth/headless/base/tests/test_views.py::test_config[app] FAILED [ 17%] allauth/headless/base/tests/test_views.py::test_config[browser] FAILED [ 17%] allauth/headless/internal/tests/test_authkit.py::test_purge_request_user_cache PASSED [ 17%] allauth/headless/mfa/tests/test_recovery_codes.py::test_get_recovery_codes_requires_reauth[app] FAILED [ 17%] allauth/headless/mfa/tests/test_recovery_codes.py::test_get_recovery_codes_requires_reauth[browser] FAILED [ 17%] allauth/headless/mfa/tests/test_recovery_codes.py::test_get_recovery_codes[app] FAILED [ 17%] allauth/headless/mfa/tests/test_recovery_codes.py::test_get_recovery_codes[browser] FAILED [ 17%] allauth/headless/mfa/tests/test_recovery_codes.py::test_generate_recovery_codes[app] FAILED [ 17%] allauth/headless/mfa/tests/test_recovery_codes.py::test_generate_recovery_codes[browser] FAILED [ 17%] allauth/headless/mfa/tests/test_totp.py::test_get_totp_not_active[app-False] FAILED [ 17%] allauth/headless/mfa/tests/test_totp.py::test_get_totp_not_active[app-True] FAILED [ 17%] allauth/headless/mfa/tests/test_totp.py::test_get_totp_not_active[browser-False] FAILED [ 17%] allauth/headless/mfa/tests/test_totp.py::test_get_totp_not_active[browser-True] FAILED [ 17%] allauth/headless/mfa/tests/test_totp.py::test_get_totp[app] FAILED [ 17%] allauth/headless/mfa/tests/test_totp.py::test_get_totp[browser] FAILED [ 17%] allauth/headless/mfa/tests/test_totp.py::test_deactivate_totp[app] FAILED [ 18%] allauth/headless/mfa/tests/test_totp.py::test_deactivate_totp[browser] FAILED [ 18%] allauth/headless/mfa/tests/test_totp.py::test_activate_totp[app-False] FAILED [ 18%] allauth/headless/mfa/tests/test_totp.py::test_activate_totp[app-True] FAILED [ 18%] allauth/headless/mfa/tests/test_totp.py::test_activate_totp[browser-False] FAILED [ 18%] allauth/headless/mfa/tests/test_totp.py::test_activate_totp[browser-True] FAILED [ 18%] allauth/headless/mfa/tests/test_views.py::test_auth_unverified_email_and_mfa[app] FAILED [ 18%] allauth/headless/mfa/tests/test_views.py::test_auth_unverified_email_and_mfa[browser] FAILED [ 18%] allauth/headless/mfa/tests/test_views.py::test_dangling_mfa_is_logged_out[app] FAILED [ 18%] allauth/headless/mfa/tests/test_views.py::test_dangling_mfa_is_logged_out[browser] FAILED [ 18%] allauth/headless/mfa/tests/test_webauthn.py::test_passkey_login[app] FAILED [ 18%] allauth/headless/mfa/tests/test_webauthn.py::test_passkey_login[browser] FAILED [ 18%] allauth/headless/mfa/tests/test_webauthn.py::test_passkey_login_get_options[app] FAILED [ 18%] allauth/headless/mfa/tests/test_webauthn.py::test_passkey_login_get_options[browser] FAILED [ 18%] allauth/headless/mfa/tests/test_webauthn.py::test_reauthenticate[app] FAILED [ 18%] allauth/headless/mfa/tests/test_webauthn.py::test_reauthenticate[browser] FAILED [ 19%] allauth/headless/mfa/tests/test_webauthn.py::test_update_authenticator[app] FAILED [ 19%] allauth/headless/mfa/tests/test_webauthn.py::test_update_authenticator[browser] FAILED [ 19%] allauth/headless/mfa/tests/test_webauthn.py::test_delete_authenticator[app] FAILED [ 19%] allauth/headless/mfa/tests/test_webauthn.py::test_delete_authenticator[browser] FAILED [ 19%] allauth/headless/mfa/tests/test_webauthn.py::test_add_authenticator[app-False] FAILED [ 19%] allauth/headless/mfa/tests/test_webauthn.py::test_add_authenticator[app-True] FAILED [ 19%] allauth/headless/mfa/tests/test_webauthn.py::test_add_authenticator[browser-False] FAILED [ 19%] allauth/headless/mfa/tests/test_webauthn.py::test_add_authenticator[browser-True] FAILED [ 19%] allauth/headless/mfa/tests/test_webauthn.py::test_2fa_login[app] FAILED [ 19%] allauth/headless/mfa/tests/test_webauthn.py::test_2fa_login[browser] FAILED [ 19%] allauth/headless/mfa/tests/test_webauthn.py::test_passkey_signup[app] FAILED [ 19%] allauth/headless/mfa/tests/test_webauthn.py::test_passkey_signup[browser] FAILED [ 19%] allauth/headless/socialaccount/tests/test_inputs.py::test_provider_token_multiple_apps[client1] PASSED [ 19%] allauth/headless/socialaccount/tests/test_inputs.py::test_provider_token_multiple_apps[client2] PASSED [ 19%] allauth/headless/socialaccount/tests/test_inputs.py::test_provider_token_client_id_required PASSED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_bad_redirect[app] FAILED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_bad_redirect[browser] FAILED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_valid_redirect[app] FAILED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_valid_redirect[browser] FAILED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_manage_providers[app] FAILED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_manage_providers[browser] FAILED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_disconnect_bad_request[app] FAILED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_disconnect_bad_request[browser] FAILED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_valid_token[app] FAILED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_valid_token[browser] FAILED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_invalid_token[app] FAILED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_invalid_token[browser] FAILED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_auth_error_no_headless_request[app] FAILED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_auth_error_no_headless_request[browser] FAILED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_auth_error_headless_request[app] FAILED [ 20%] allauth/headless/socialaccount/tests/test_views.py::test_auth_error_headless_request[browser] FAILED [ 21%] allauth/headless/socialaccount/tests/test_views.py::test_auth_error_no_headless_state_request_headless_only[app] FAILED [ 21%] allauth/headless/socialaccount/tests/test_views.py::test_auth_error_no_headless_state_request_headless_only[browser] FAILED [ 21%] allauth/headless/socialaccount/tests/test_views.py::test_auth_error_headless_state_request_headless_only[app] FAILED [ 21%] allauth/headless/socialaccount/tests/test_views.py::test_auth_error_headless_state_request_headless_only[browser] FAILED [ 21%] allauth/headless/socialaccount/tests/test_views.py::test_token_signup_closed[app] FAILED [ 21%] allauth/headless/socialaccount/tests/test_views.py::test_token_signup_closed[browser] FAILED [ 21%] allauth/headless/socialaccount/tests/test_views.py::test_provider_signup[app] FAILED [ 21%] allauth/headless/socialaccount/tests/test_views.py::test_provider_signup[browser] FAILED [ 21%] allauth/headless/socialaccount/tests/test_views.py::test_signup_closed[app] FAILED [ 21%] allauth/headless/socialaccount/tests/test_views.py::test_signup_closed[browser] FAILED [ 21%] allauth/headless/socialaccount/tests/test_views.py::test_connect[app] FAILED [ 21%] allauth/headless/socialaccount/tests/test_views.py::test_connect[browser] FAILED [ 21%] allauth/headless/socialaccount/tests/test_views.py::test_connect_reauthentication_required[app] FAILED [ 21%] allauth/headless/socialaccount/tests/test_views.py::test_connect_reauthentication_required[browser] FAILED [ 21%] allauth/headless/socialaccount/tests/test_views.py::test_connect_already_connected[app] FAILED [ 22%] allauth/headless/socialaccount/tests/test_views.py::test_connect_already_connected[browser] FAILED [ 22%] allauth/headless/socialaccount/tests/test_views.py::test_token_connect[app] FAILED [ 22%] allauth/headless/socialaccount/tests/test_views.py::test_token_connect[browser] FAILED [ 22%] allauth/headless/socialaccount/tests/test_views.py::test_token_connect_already_connected[app] FAILED [ 22%] allauth/headless/socialaccount/tests/test_views.py::test_token_connect_already_connected[browser] FAILED [ 22%] allauth/headless/socialaccount/tests/test_views.py::test_provider_signup_not_pending[app] FAILED [ 22%] allauth/headless/socialaccount/tests/test_views.py::test_provider_signup_not_pending[browser] FAILED [ 22%] allauth/headless/tests/test_tokens.py::test_access_token[app] FAILED [ 22%] allauth/headless/tests/test_tokens.py::test_access_token[browser] FAILED [ 22%] allauth/headless/usersessions/tests/test_views.py::test_flow[app] FAILED [ 22%] allauth/headless/usersessions/tests/test_views.py::test_flow[browser] FAILED [ 22%] allauth/mfa/base/tests/test_views.py::test_reauthentication FAILED [ 22%] allauth/mfa/base/tests/test_views.py::test_index FAILED [ 22%] allauth/mfa/base/tests/test_views.py::test_add_email_not_allowed FAILED [ 22%] allauth/mfa/recovery_codes/tests/test_auth.py::test_flow PASSED [ 23%] allauth/mfa/recovery_codes/tests/test_auth.py::test_migrated_codes PASSED [ 23%] allauth/mfa/recovery_codes/tests/test_views.py::test_generate_recovery_codes_require_other_authenticator FAILED [ 23%] allauth/mfa/recovery_codes/tests/test_views.py::test_download_recovery_codes FAILED [ 23%] allauth/mfa/recovery_codes/tests/test_views.py::test_view_recovery_codes FAILED [ 23%] allauth/mfa/recovery_codes/tests/test_views.py::test_generate_recovery_codes FAILED [ 23%] allauth/mfa/recovery_codes/tests/test_views.py::test_recovery_codes_login FAILED [ 23%] allauth/mfa/totp/tests/test_views.py::test_activate_totp_with_incorrect_code FAILED [ 23%] allauth/mfa/totp/tests/test_views.py::test_activate_totp_with_unverified_email[get-False] FAILED [ 23%] allauth/mfa/totp/tests/test_views.py::test_activate_totp_with_unverified_email[post-False] FAILED [ 23%] allauth/mfa/totp/tests/test_views.py::test_activate_totp_success FAILED [ 23%] allauth/mfa/totp/tests/test_views.py::test_deactivate_totp_success FAILED [ 23%] allauth/mfa/totp/tests/test_views.py::test_user_without_totp_deactivate_totp FAILED [ 23%] allauth/mfa/totp/tests/test_views.py::test_user_with_totp_activate_totp FAILED [ 23%] allauth/mfa/totp/tests/test_views.py::test_totp_login FAILED [ 23%] allauth/mfa/totp/tests/test_views.py::test_totp_login_rate_limit FAILED [ 23%] allauth/mfa/totp/tests/test_views.py::test_cannot_deactivate_totp FAILED [ 24%] allauth/mfa/totp/tests/test_views.py::test_totp_code_reuse FAILED [ 24%] allauth/mfa/totp/tests/test_views.py::test_totp_stage_expires FAILED [ 24%] allauth/mfa/webauthn/tests/test_views.py::test_passkey_login FAILED [ 24%] allauth/mfa/webauthn/tests/test_views.py::test_reauthenticate FAILED [ 24%] allauth/mfa/webauthn/tests/test_views.py::test_get_passkey_login_challenge FAILED [ 24%] allauth/mfa/webauthn/tests/test_views.py::test_invalid_passkey_login FAILED [ 24%] allauth/mfa/webauthn/tests/test_views.py::test_rename_key FAILED [ 24%] allauth/mfa/webauthn/tests/test_views.py::test_remove_key FAILED [ 24%] allauth/mfa/webauthn/tests/test_views.py::test_add_key[False] FAILED [ 24%] allauth/mfa/webauthn/tests/test_views.py::test_add_key[True] FAILED [ 24%] allauth/mfa/webauthn/tests/test_views.py::test_list_keys FAILED [ 24%] allauth/mfa/webauthn/tests/test_views.py::test_add_with_unverified_email[get-False] FAILED [ 24%] allauth/mfa/webauthn/tests/test_views.py::test_add_with_unverified_email[post-False] FAILED [ 24%] allauth/mfa/webauthn/tests/test_views.py::test_passkey_signup FAILED [ 24%] allauth/mfa/webauthn/tests/test_views.py::test_webauthn_login FAILED [ 25%] allauth/socialaccount/providers/agave/tests.py::AgaveTests::test_account_refresh_token_saved_next_login FAILED [ 25%] allauth/socialaccount/providers/agave/tests.py::AgaveTests::test_account_tokens FAILED [ 25%] allauth/socialaccount/providers/agave/tests.py::AgaveTests::test_authentication_error FAILED [ 25%] allauth/socialaccount/providers/agave/tests.py::AgaveTests::test_login FAILED [ 25%] allauth/socialaccount/providers/agave/tests.py::AgaveTests::test_login_with_pkce_disabled FAILED [ 25%] allauth/socialaccount/providers/agave/tests.py::AgaveTests::test_login_with_pkce_enabled FAILED [ 25%] allauth/socialaccount/providers/agave/tests.py::AgaveTests::test_provider_has_no_pkce_params PASSED [ 25%] allauth/socialaccount/providers/agave/tests.py::AgaveTests::test_provider_has_pkce_params PASSED [ 25%] allauth/socialaccount/providers/amazon/tests.py::AmazonTests::test_account_refresh_token_saved_next_login FAILED [ 25%] allauth/socialaccount/providers/amazon/tests.py::AmazonTests::test_account_tokens FAILED [ 25%] allauth/socialaccount/providers/amazon/tests.py::AmazonTests::test_authentication_error FAILED [ 25%] allauth/socialaccount/providers/amazon/tests.py::AmazonTests::test_login FAILED [ 25%] allauth/socialaccount/providers/amazon/tests.py::AmazonTests::test_login_with_pkce_disabled FAILED [ 25%] allauth/socialaccount/providers/amazon/tests.py::AmazonTests::test_login_with_pkce_enabled FAILED [ 25%] allauth/socialaccount/providers/amazon/tests.py::AmazonTests::test_provider_has_no_pkce_params PASSED [ 26%] allauth/socialaccount/providers/amazon/tests.py::AmazonTests::test_provider_has_pkce_params PASSED [ 26%] allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_account_refresh_token_saved_next_login FAILED [ 26%] allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_account_tokens FAILED [ 26%] allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_authentication_error FAILED [ 26%] allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_login FAILED [ 26%] allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_login_with_pkce_disabled FAILED [ 26%] allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_login_with_pkce_enabled FAILED [ 26%] allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_oauth2_adapter_raises_if_domain_settings_is_missing FAILED [ 26%] allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_provider_has_no_pkce_params PASSED [ 26%] allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_provider_has_pkce_params PASSED [ 26%] allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_provider_slug_replaces_underscores_with_hyphens PASSED [ 26%] allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_saves_email_as_verified_if_email_is_verified_in_cognito FAILED [ 26%] allauth/socialaccount/providers/angellist/tests.py::AngelListTests::test_account_refresh_token_saved_next_login FAILED [ 26%] allauth/socialaccount/providers/angellist/tests.py::AngelListTests::test_account_tokens FAILED [ 26%] allauth/socialaccount/providers/angellist/tests.py::AngelListTests::test_authentication_error FAILED [ 26%] allauth/socialaccount/providers/angellist/tests.py::AngelListTests::test_login FAILED [ 27%] allauth/socialaccount/providers/angellist/tests.py::AngelListTests::test_login_with_pkce_disabled FAILED [ 27%] allauth/socialaccount/providers/angellist/tests.py::AngelListTests::test_login_with_pkce_enabled FAILED [ 27%] allauth/socialaccount/providers/angellist/tests.py::AngelListTests::test_provider_has_no_pkce_params PASSED [ 27%] allauth/socialaccount/providers/angellist/tests.py::AngelListTests::test_provider_has_pkce_params PASSED [ 27%] allauth/socialaccount/providers/apple/tests.py::AppleTests::test_account_refresh_token_saved_next_login FAILED [ 27%] allauth/socialaccount/providers/apple/tests.py::AppleTests::test_account_tokens FAILED [ 27%] allauth/socialaccount/providers/apple/tests.py::AppleTests::test_apple_finish FAILED [ 27%] allauth/socialaccount/providers/apple/tests.py::AppleTests::test_authentication_error FAILED [ 27%] allauth/socialaccount/providers/apple/tests.py::AppleTests::test_login FAILED [ 27%] allauth/socialaccount/providers/apple/tests.py::AppleTests::test_login_with_pkce_disabled FAILED [ 27%] allauth/socialaccount/providers/apple/tests.py::AppleTests::test_login_with_pkce_enabled FAILED [ 27%] allauth/socialaccount/providers/apple/tests.py::AppleTests::test_provider_has_no_pkce_params PASSED [ 27%] allauth/socialaccount/providers/apple/tests.py::AppleTests::test_provider_has_pkce_params PASSED [ 27%] allauth/socialaccount/providers/apple/tests.py::AppleTests::test_verify_token PASSED [ 27%] allauth/socialaccount/providers/asana/tests.py::AsanaTests::test_account_refresh_token_saved_next_login FAILED [ 28%] allauth/socialaccount/providers/asana/tests.py::AsanaTests::test_account_tokens FAILED [ 28%] allauth/socialaccount/providers/asana/tests.py::AsanaTests::test_authentication_error FAILED [ 28%] allauth/socialaccount/providers/asana/tests.py::AsanaTests::test_login FAILED [ 28%] allauth/socialaccount/providers/asana/tests.py::AsanaTests::test_login_with_pkce_disabled FAILED [ 28%] allauth/socialaccount/providers/asana/tests.py::AsanaTests::test_login_with_pkce_enabled FAILED [ 28%] allauth/socialaccount/providers/asana/tests.py::AsanaTests::test_provider_has_no_pkce_params PASSED [ 28%] allauth/socialaccount/providers/asana/tests.py::AsanaTests::test_provider_has_pkce_params PASSED [ 28%] allauth/socialaccount/providers/atlassian/tests.py::AtlassianTests::test_account_refresh_token_saved_next_login FAILED [ 28%] allauth/socialaccount/providers/atlassian/tests.py::AtlassianTests::test_account_tokens FAILED [ 28%] allauth/socialaccount/providers/atlassian/tests.py::AtlassianTests::test_authentication_error FAILED [ 28%] allauth/socialaccount/providers/atlassian/tests.py::AtlassianTests::test_login FAILED [ 28%] allauth/socialaccount/providers/atlassian/tests.py::AtlassianTests::test_login_with_pkce_disabled FAILED [ 28%] allauth/socialaccount/providers/atlassian/tests.py::AtlassianTests::test_login_with_pkce_enabled FAILED [ 28%] allauth/socialaccount/providers/atlassian/tests.py::AtlassianTests::test_provider_has_no_pkce_params PASSED [ 28%] allauth/socialaccount/providers/atlassian/tests.py::AtlassianTests::test_provider_has_pkce_params PASSED [ 29%] allauth/socialaccount/providers/auth0/tests.py::Auth0Tests::test_account_refresh_token_saved_next_login FAILED [ 29%] allauth/socialaccount/providers/auth0/tests.py::Auth0Tests::test_account_tokens FAILED [ 29%] allauth/socialaccount/providers/auth0/tests.py::Auth0Tests::test_authentication_error FAILED [ 29%] allauth/socialaccount/providers/auth0/tests.py::Auth0Tests::test_login FAILED [ 29%] allauth/socialaccount/providers/auth0/tests.py::Auth0Tests::test_login_with_pkce_disabled FAILED [ 29%] allauth/socialaccount/providers/auth0/tests.py::Auth0Tests::test_login_with_pkce_enabled FAILED [ 29%] allauth/socialaccount/providers/auth0/tests.py::Auth0Tests::test_provider_has_no_pkce_params PASSED [ 29%] allauth/socialaccount/providers/auth0/tests.py::Auth0Tests::test_provider_has_pkce_params PASSED [ 29%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_account_refresh_token_saved_next_login FAILED [ 29%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_account_tokens FAILED [ 29%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_authentication_error FAILED [ 29%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_default_scopes_email PASSED [ 29%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_default_scopes_no_email PASSED [ 29%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_dynamic_scopes PASSED [ 29%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_login FAILED [ 30%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_login_with_pkce_disabled FAILED [ 30%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_login_with_pkce_enabled FAILED [ 30%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_provider_has_no_pkce_params PASSED [ 30%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_provider_has_pkce_params PASSED [ 30%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_scopes PASSED [ 30%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_scopes_optional_email PASSED [ 30%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_scopes_optional_verified_email PASSED [ 30%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_scopes_required_email PASSED [ 30%] allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_scopes_required_verified_email PASSED [ 30%] allauth/socialaccount/providers/baidu/tests.py::BaiduTests::test_account_refresh_token_saved_next_login FAILED [ 30%] allauth/socialaccount/providers/baidu/tests.py::BaiduTests::test_account_tokens FAILED [ 30%] allauth/socialaccount/providers/baidu/tests.py::BaiduTests::test_authentication_error FAILED [ 30%] allauth/socialaccount/providers/baidu/tests.py::BaiduTests::test_login FAILED [ 30%] allauth/socialaccount/providers/baidu/tests.py::BaiduTests::test_login_with_pkce_disabled FAILED [ 30%] allauth/socialaccount/providers/baidu/tests.py::BaiduTests::test_login_with_pkce_enabled FAILED [ 30%] allauth/socialaccount/providers/baidu/tests.py::BaiduTests::test_provider_has_no_pkce_params PASSED [ 31%] allauth/socialaccount/providers/baidu/tests.py::BaiduTests::test_provider_has_pkce_params PASSED [ 31%] allauth/socialaccount/providers/basecamp/tests.py::BasecampTests::test_account_refresh_token_saved_next_login FAILED [ 31%] allauth/socialaccount/providers/basecamp/tests.py::BasecampTests::test_account_tokens FAILED [ 31%] allauth/socialaccount/providers/basecamp/tests.py::BasecampTests::test_authentication_error FAILED [ 31%] allauth/socialaccount/providers/basecamp/tests.py::BasecampTests::test_login FAILED [ 31%] allauth/socialaccount/providers/basecamp/tests.py::BasecampTests::test_login_with_pkce_disabled FAILED [ 31%] allauth/socialaccount/providers/basecamp/tests.py::BasecampTests::test_login_with_pkce_enabled FAILED [ 31%] allauth/socialaccount/providers/basecamp/tests.py::BasecampTests::test_provider_has_no_pkce_params PASSED [ 31%] allauth/socialaccount/providers/basecamp/tests.py::BasecampTests::test_provider_has_pkce_params PASSED [ 31%] allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_account_refresh_token_saved_next_login FAILED [ 31%] allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_account_tokens FAILED [ 31%] allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_authentication_error FAILED [ 31%] allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_error_response PASSED [ 31%] allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_extra_data FAILED [ 31%] allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_invalid_data PASSED [ 32%] allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_invalid_response PASSED [ 32%] allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_login FAILED [ 32%] allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_login_with_pkce_disabled FAILED [ 32%] allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_login_with_pkce_enabled FAILED [ 32%] allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_profile_invalid_response PASSED [ 32%] allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_provider_has_no_pkce_params PASSED [ 32%] allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_provider_has_pkce_params PASSED [ 32%] allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_service_not_found PASSED [ 32%] allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_valid_response_no_battletag PASSED [ 32%] allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_account_refresh_token_saved_next_login FAILED [ 32%] allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_account_tokens FAILED [ 32%] allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_authentication_error FAILED [ 32%] allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_login FAILED [ 32%] allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_login_with_pkce_disabled FAILED [ 32%] allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_login_with_pkce_enabled FAILED [ 33%] allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_provider_account FAILED [ 33%] allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_provider_has_no_pkce_params PASSED [ 33%] allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_provider_has_pkce_params PASSED [ 33%] allauth/socialaccount/providers/bitly/tests.py::BitlyTests::test_account_refresh_token_saved_next_login FAILED [ 33%] allauth/socialaccount/providers/bitly/tests.py::BitlyTests::test_account_tokens FAILED [ 33%] allauth/socialaccount/providers/bitly/tests.py::BitlyTests::test_authentication_error FAILED [ 33%] allauth/socialaccount/providers/bitly/tests.py::BitlyTests::test_login FAILED [ 33%] allauth/socialaccount/providers/bitly/tests.py::BitlyTests::test_login_with_pkce_disabled FAILED [ 33%] allauth/socialaccount/providers/bitly/tests.py::BitlyTests::test_login_with_pkce_enabled FAILED [ 33%] allauth/socialaccount/providers/bitly/tests.py::BitlyTests::test_provider_has_no_pkce_params PASSED [ 33%] allauth/socialaccount/providers/bitly/tests.py::BitlyTests::test_provider_has_pkce_params PASSED [ 33%] allauth/socialaccount/providers/box/tests.py::BoxOAuth2Tests::test_account_refresh_token_saved_next_login FAILED [ 33%] allauth/socialaccount/providers/box/tests.py::BoxOAuth2Tests::test_account_tokens FAILED [ 33%] allauth/socialaccount/providers/box/tests.py::BoxOAuth2Tests::test_authentication_error FAILED [ 33%] allauth/socialaccount/providers/box/tests.py::BoxOAuth2Tests::test_login FAILED [ 33%] allauth/socialaccount/providers/box/tests.py::BoxOAuth2Tests::test_login_with_pkce_disabled FAILED [ 34%] allauth/socialaccount/providers/box/tests.py::BoxOAuth2Tests::test_login_with_pkce_enabled FAILED [ 34%] allauth/socialaccount/providers/box/tests.py::BoxOAuth2Tests::test_provider_has_no_pkce_params PASSED [ 34%] allauth/socialaccount/providers/box/tests.py::BoxOAuth2Tests::test_provider_has_pkce_params PASSED [ 34%] allauth/socialaccount/providers/cilogon/tests.py::CILogonTests::test_account_refresh_token_saved_next_login FAILED [ 34%] allauth/socialaccount/providers/cilogon/tests.py::CILogonTests::test_account_tokens FAILED [ 34%] allauth/socialaccount/providers/cilogon/tests.py::CILogonTests::test_authentication_error FAILED [ 34%] allauth/socialaccount/providers/cilogon/tests.py::CILogonTests::test_login FAILED [ 34%] allauth/socialaccount/providers/cilogon/tests.py::CILogonTests::test_login_with_pkce_disabled FAILED [ 34%] allauth/socialaccount/providers/cilogon/tests.py::CILogonTests::test_login_with_pkce_enabled FAILED [ 34%] allauth/socialaccount/providers/cilogon/tests.py::CILogonTests::test_provider_has_no_pkce_params PASSED [ 34%] allauth/socialaccount/providers/cilogon/tests.py::CILogonTests::test_provider_has_pkce_params PASSED [ 34%] allauth/socialaccount/providers/clever/tests.py::CleverOAuth2Tests::test_account_refresh_token_saved_next_login FAILED [ 34%] allauth/socialaccount/providers/clever/tests.py::CleverOAuth2Tests::test_account_tokens FAILED [ 34%] allauth/socialaccount/providers/clever/tests.py::CleverOAuth2Tests::test_authentication_error FAILED [ 34%] allauth/socialaccount/providers/clever/tests.py::CleverOAuth2Tests::test_login FAILED [ 35%] allauth/socialaccount/providers/clever/tests.py::CleverOAuth2Tests::test_login_with_pkce_disabled FAILED [ 35%] allauth/socialaccount/providers/clever/tests.py::CleverOAuth2Tests::test_login_with_pkce_enabled FAILED [ 35%] allauth/socialaccount/providers/clever/tests.py::CleverOAuth2Tests::test_provider_has_no_pkce_params PASSED [ 35%] allauth/socialaccount/providers/clever/tests.py::CleverOAuth2Tests::test_provider_has_pkce_params PASSED [ 35%] allauth/socialaccount/providers/coinbase/tests.py::CoinbaseTests::test_account_refresh_token_saved_next_login FAILED [ 35%] allauth/socialaccount/providers/coinbase/tests.py::CoinbaseTests::test_account_tokens FAILED [ 35%] allauth/socialaccount/providers/coinbase/tests.py::CoinbaseTests::test_authentication_error FAILED [ 35%] allauth/socialaccount/providers/coinbase/tests.py::CoinbaseTests::test_login FAILED [ 35%] allauth/socialaccount/providers/coinbase/tests.py::CoinbaseTests::test_login_with_pkce_disabled FAILED [ 35%] allauth/socialaccount/providers/coinbase/tests.py::CoinbaseTests::test_login_with_pkce_enabled FAILED [ 35%] allauth/socialaccount/providers/coinbase/tests.py::CoinbaseTests::test_provider_has_no_pkce_params PASSED [ 35%] allauth/socialaccount/providers/coinbase/tests.py::CoinbaseTests::test_provider_has_pkce_params PASSED [ 35%] allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_account_refresh_token_saved_next_login FAILED [ 35%] allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_account_tokens FAILED [ 35%] allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_authentication_error FAILED [ 36%] allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_extract_common_fields PASSED [ 36%] allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_extract_extra_data PASSED [ 36%] allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_extract_uid PASSED [ 36%] allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_login FAILED [ 36%] allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_login_with_pkce_disabled FAILED [ 36%] allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_login_with_pkce_enabled FAILED [ 36%] allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_provider_has_no_pkce_params PASSED [ 36%] allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_provider_has_pkce_params PASSED [ 36%] allauth/socialaccount/providers/daum/tests.py::DaumTests::test_account_refresh_token_saved_next_login FAILED [ 36%] allauth/socialaccount/providers/daum/tests.py::DaumTests::test_account_tokens FAILED [ 36%] allauth/socialaccount/providers/daum/tests.py::DaumTests::test_authentication_error FAILED [ 36%] allauth/socialaccount/providers/daum/tests.py::DaumTests::test_login FAILED [ 36%] allauth/socialaccount/providers/daum/tests.py::DaumTests::test_login_with_pkce_disabled FAILED [ 36%] allauth/socialaccount/providers/daum/tests.py::DaumTests::test_login_with_pkce_enabled FAILED [ 36%] allauth/socialaccount/providers/daum/tests.py::DaumTests::test_provider_has_no_pkce_params PASSED [ 36%] allauth/socialaccount/providers/daum/tests.py::DaumTests::test_provider_has_pkce_params PASSED [ 37%] allauth/socialaccount/providers/digitalocean/tests.py::DigitalOceanTests::test_account_refresh_token_saved_next_login FAILED [ 37%] allauth/socialaccount/providers/digitalocean/tests.py::DigitalOceanTests::test_account_tokens FAILED [ 37%] allauth/socialaccount/providers/digitalocean/tests.py::DigitalOceanTests::test_authentication_error FAILED [ 37%] allauth/socialaccount/providers/digitalocean/tests.py::DigitalOceanTests::test_login FAILED [ 37%] allauth/socialaccount/providers/digitalocean/tests.py::DigitalOceanTests::test_login_with_pkce_disabled FAILED [ 37%] allauth/socialaccount/providers/digitalocean/tests.py::DigitalOceanTests::test_login_with_pkce_enabled FAILED [ 37%] allauth/socialaccount/providers/digitalocean/tests.py::DigitalOceanTests::test_provider_has_no_pkce_params PASSED [ 37%] allauth/socialaccount/providers/digitalocean/tests.py::DigitalOceanTests::test_provider_has_pkce_params PASSED [ 37%] allauth/socialaccount/providers/dingtalk/tests.py::DingTalkTests::test_account_refresh_token_saved_next_login FAILED [ 37%] allauth/socialaccount/providers/dingtalk/tests.py::DingTalkTests::test_account_tokens FAILED [ 37%] allauth/socialaccount/providers/dingtalk/tests.py::DingTalkTests::test_authentication_error FAILED [ 37%] allauth/socialaccount/providers/dingtalk/tests.py::DingTalkTests::test_login FAILED [ 37%] allauth/socialaccount/providers/dingtalk/tests.py::DingTalkTests::test_login_with_pkce_disabled FAILED [ 37%] allauth/socialaccount/providers/dingtalk/tests.py::DingTalkTests::test_login_with_pkce_enabled FAILED [ 37%] allauth/socialaccount/providers/dingtalk/tests.py::DingTalkTests::test_provider_has_no_pkce_params PASSED [ 38%] allauth/socialaccount/providers/dingtalk/tests.py::DingTalkTests::test_provider_has_pkce_params PASSED [ 38%] allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_account_refresh_token_saved_next_login FAILED [ 38%] allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_account_tokens FAILED [ 38%] allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_authentication_error FAILED [ 38%] allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_display_name FAILED [ 38%] allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_login FAILED [ 38%] allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_login_with_pkce_disabled FAILED [ 38%] allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_login_with_pkce_enabled FAILED [ 38%] allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_provider_has_no_pkce_params PASSED [ 38%] allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_provider_has_pkce_params PASSED [ 38%] allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_account_refresh_token_saved_next_login FAILED [ 38%] allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_account_tokens FAILED [ 38%] allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_authentication_error FAILED [ 38%] allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_display_name FAILED [ 38%] allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_login FAILED [ 39%] allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_login_with_pkce_disabled FAILED [ 39%] allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_login_with_pkce_enabled FAILED [ 39%] allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_provider_has_no_pkce_params PASSED [ 39%] allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_provider_has_pkce_params PASSED [ 39%] allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_account_connect FAILED [ 39%] allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_account_refresh_token_saved_next_login FAILED [ 39%] allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_account_tokens FAILED [ 39%] allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_authentication_error FAILED [ 39%] allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_login FAILED [ 39%] allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_login_with_pkce_disabled FAILED [ 39%] allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_login_with_pkce_enabled FAILED [ 39%] allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_provider_has_no_pkce_params PASSED [ 39%] allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_provider_has_pkce_params PASSED [ 39%] allauth/socialaccount/providers/douban/tests.py::DoubanTests::test_account_refresh_token_saved_next_login FAILED [ 39%] allauth/socialaccount/providers/douban/tests.py::DoubanTests::test_account_tokens FAILED [ 40%] allauth/socialaccount/providers/douban/tests.py::DoubanTests::test_authentication_error FAILED [ 40%] allauth/socialaccount/providers/douban/tests.py::DoubanTests::test_login FAILED [ 40%] allauth/socialaccount/providers/douban/tests.py::DoubanTests::test_login_with_pkce_disabled FAILED [ 40%] allauth/socialaccount/providers/douban/tests.py::DoubanTests::test_login_with_pkce_enabled FAILED [ 40%] allauth/socialaccount/providers/douban/tests.py::DoubanTests::test_provider_has_no_pkce_params PASSED [ 40%] allauth/socialaccount/providers/douban/tests.py::DoubanTests::test_provider_has_pkce_params PASSED [ 40%] allauth/socialaccount/providers/doximity/tests.py::DoximityTests::test_account_refresh_token_saved_next_login FAILED [ 40%] allauth/socialaccount/providers/doximity/tests.py::DoximityTests::test_account_tokens FAILED [ 40%] allauth/socialaccount/providers/doximity/tests.py::DoximityTests::test_authentication_error FAILED [ 40%] allauth/socialaccount/providers/doximity/tests.py::DoximityTests::test_login FAILED [ 40%] allauth/socialaccount/providers/doximity/tests.py::DoximityTests::test_login_with_pkce_disabled FAILED [ 40%] allauth/socialaccount/providers/doximity/tests.py::DoximityTests::test_login_with_pkce_enabled FAILED [ 40%] allauth/socialaccount/providers/doximity/tests.py::DoximityTests::test_provider_has_no_pkce_params PASSED [ 40%] allauth/socialaccount/providers/doximity/tests.py::DoximityTests::test_provider_has_pkce_params PASSED [ 40%] allauth/socialaccount/providers/draugiem/tests.py::DraugiemTests::test_callback FAILED [ 40%] allauth/socialaccount/providers/draugiem/tests.py::DraugiemTests::test_callback_invalid_auth_status FAILED [ 41%] allauth/socialaccount/providers/draugiem/tests.py::DraugiemTests::test_callback_no_auth_status FAILED [ 41%] allauth/socialaccount/providers/draugiem/tests.py::DraugiemTests::test_login_redirect FAILED [ 41%] allauth/socialaccount/providers/drip/tests.py::DripTests::test_account_refresh_token_saved_next_login FAILED [ 41%] allauth/socialaccount/providers/drip/tests.py::DripTests::test_account_tokens FAILED [ 41%] allauth/socialaccount/providers/drip/tests.py::DripTests::test_authentication_error FAILED [ 41%] allauth/socialaccount/providers/drip/tests.py::DripTests::test_login FAILED [ 41%] allauth/socialaccount/providers/drip/tests.py::DripTests::test_login_with_pkce_disabled FAILED [ 41%] allauth/socialaccount/providers/drip/tests.py::DripTests::test_login_with_pkce_enabled FAILED [ 41%] allauth/socialaccount/providers/drip/tests.py::DripTests::test_provider_has_no_pkce_params PASSED [ 41%] allauth/socialaccount/providers/drip/tests.py::DripTests::test_provider_has_pkce_params PASSED [ 41%] allauth/socialaccount/providers/dropbox/tests.py::DropboxOAuth2Tests::test_account_refresh_token_saved_next_login FAILED [ 41%] allauth/socialaccount/providers/dropbox/tests.py::DropboxOAuth2Tests::test_account_tokens FAILED [ 41%] allauth/socialaccount/providers/dropbox/tests.py::DropboxOAuth2Tests::test_authentication_error FAILED [ 41%] allauth/socialaccount/providers/dropbox/tests.py::DropboxOAuth2Tests::test_login FAILED [ 41%] allauth/socialaccount/providers/dropbox/tests.py::DropboxOAuth2Tests::test_login_with_pkce_disabled FAILED [ 42%] allauth/socialaccount/providers/dropbox/tests.py::DropboxOAuth2Tests::test_login_with_pkce_enabled FAILED [ 42%] allauth/socialaccount/providers/dropbox/tests.py::DropboxOAuth2Tests::test_provider_has_no_pkce_params PASSED [ 42%] allauth/socialaccount/providers/dropbox/tests.py::DropboxOAuth2Tests::test_provider_has_pkce_params PASSED [ 42%] allauth/socialaccount/providers/dummy/tests.py::test_login FAILED [ 42%] allauth/socialaccount/providers/dwolla/tests.py::DwollaTests::test_account_refresh_token_saved_next_login FAILED [ 42%] allauth/socialaccount/providers/dwolla/tests.py::DwollaTests::test_account_tokens FAILED [ 42%] allauth/socialaccount/providers/dwolla/tests.py::DwollaTests::test_authentication_error FAILED [ 42%] allauth/socialaccount/providers/dwolla/tests.py::DwollaTests::test_login FAILED [ 42%] allauth/socialaccount/providers/dwolla/tests.py::DwollaTests::test_login_with_pkce_disabled FAILED [ 42%] allauth/socialaccount/providers/dwolla/tests.py::DwollaTests::test_login_with_pkce_enabled FAILED [ 42%] allauth/socialaccount/providers/dwolla/tests.py::DwollaTests::test_provider_has_no_pkce_params PASSED [ 42%] allauth/socialaccount/providers/dwolla/tests.py::DwollaTests::test_provider_has_pkce_params PASSED [ 42%] allauth/socialaccount/providers/edmodo/tests.py::EdmodoTests::test_account_refresh_token_saved_next_login FAILED [ 42%] allauth/socialaccount/providers/edmodo/tests.py::EdmodoTests::test_account_tokens FAILED [ 42%] allauth/socialaccount/providers/edmodo/tests.py::EdmodoTests::test_authentication_error FAILED [ 43%] allauth/socialaccount/providers/edmodo/tests.py::EdmodoTests::test_login FAILED [ 43%] allauth/socialaccount/providers/edmodo/tests.py::EdmodoTests::test_login_with_pkce_disabled FAILED [ 43%] allauth/socialaccount/providers/edmodo/tests.py::EdmodoTests::test_login_with_pkce_enabled FAILED [ 43%] allauth/socialaccount/providers/edmodo/tests.py::EdmodoTests::test_provider_has_no_pkce_params PASSED [ 43%] allauth/socialaccount/providers/edmodo/tests.py::EdmodoTests::test_provider_has_pkce_params PASSED [ 43%] allauth/socialaccount/providers/edx/tests.py::EdxTests::test_account_refresh_token_saved_next_login FAILED [ 43%] allauth/socialaccount/providers/edx/tests.py::EdxTests::test_account_tokens FAILED [ 43%] allauth/socialaccount/providers/edx/tests.py::EdxTests::test_authentication_error FAILED [ 43%] allauth/socialaccount/providers/edx/tests.py::EdxTests::test_login FAILED [ 43%] allauth/socialaccount/providers/edx/tests.py::EdxTests::test_login_with_pkce_disabled FAILED [ 43%] allauth/socialaccount/providers/edx/tests.py::EdxTests::test_login_with_pkce_enabled FAILED [ 43%] allauth/socialaccount/providers/edx/tests.py::EdxTests::test_provider_has_no_pkce_params PASSED [ 43%] allauth/socialaccount/providers/edx/tests.py::EdxTests::test_provider_has_pkce_params PASSED [ 43%] allauth/socialaccount/providers/eventbrite/tests.py::EventbriteTests::test_account_refresh_token_saved_next_login FAILED [ 43%] allauth/socialaccount/providers/eventbrite/tests.py::EventbriteTests::test_account_tokens FAILED [ 43%] allauth/socialaccount/providers/eventbrite/tests.py::EventbriteTests::test_authentication_error FAILED [ 44%] allauth/socialaccount/providers/eventbrite/tests.py::EventbriteTests::test_login FAILED [ 44%] allauth/socialaccount/providers/eventbrite/tests.py::EventbriteTests::test_login_with_pkce_disabled FAILED [ 44%] allauth/socialaccount/providers/eventbrite/tests.py::EventbriteTests::test_login_with_pkce_enabled FAILED [ 44%] allauth/socialaccount/providers/eventbrite/tests.py::EventbriteTests::test_provider_has_no_pkce_params PASSED [ 44%] allauth/socialaccount/providers/eventbrite/tests.py::EventbriteTests::test_provider_has_pkce_params PASSED [ 44%] allauth/socialaccount/providers/eveonline/tests.py::EveOnlineTests::test_account_refresh_token_saved_next_login FAILED [ 44%] allauth/socialaccount/providers/eveonline/tests.py::EveOnlineTests::test_account_tokens FAILED [ 44%] allauth/socialaccount/providers/eveonline/tests.py::EveOnlineTests::test_authentication_error FAILED [ 44%] allauth/socialaccount/providers/eveonline/tests.py::EveOnlineTests::test_login FAILED [ 44%] allauth/socialaccount/providers/eveonline/tests.py::EveOnlineTests::test_login_with_pkce_disabled FAILED [ 44%] allauth/socialaccount/providers/eveonline/tests.py::EveOnlineTests::test_login_with_pkce_enabled FAILED [ 44%] allauth/socialaccount/providers/eveonline/tests.py::EveOnlineTests::test_provider_has_no_pkce_params PASSED [ 44%] allauth/socialaccount/providers/eveonline/tests.py::EveOnlineTests::test_provider_has_pkce_params PASSED [ 44%] allauth/socialaccount/providers/evernote/tests.py::EvernoteTests::test_authentication_error FAILED [ 44%] allauth/socialaccount/providers/evernote/tests.py::EvernoteTests::test_auto_signup PASSED [ 45%] allauth/socialaccount/providers/evernote/tests.py::EvernoteTests::test_login FAILED [ 45%] allauth/socialaccount/providers/exist/tests.py::ExistTests::test_account_refresh_token_saved_next_login FAILED [ 45%] allauth/socialaccount/providers/exist/tests.py::ExistTests::test_account_tokens FAILED [ 45%] allauth/socialaccount/providers/exist/tests.py::ExistTests::test_authentication_error FAILED [ 45%] allauth/socialaccount/providers/exist/tests.py::ExistTests::test_login FAILED [ 45%] allauth/socialaccount/providers/exist/tests.py::ExistTests::test_login_with_pkce_disabled FAILED [ 45%] allauth/socialaccount/providers/exist/tests.py::ExistTests::test_login_with_pkce_enabled FAILED [ 45%] allauth/socialaccount/providers/exist/tests.py::ExistTests::test_provider_has_no_pkce_params PASSED [ 45%] allauth/socialaccount/providers/exist/tests.py::ExistTests::test_provider_has_pkce_params PASSED [ 45%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_account_refresh_token_saved_next_login FAILED [ 45%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_account_tokens FAILED [ 45%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_authentication_error FAILED [ 45%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_login FAILED [ 45%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_login_by_token FAILED [ 45%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_login_by_token_reauthenticate FAILED [ 46%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_login_unverified FAILED [ 46%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_login_verified FAILED [ 46%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_login_with_pkce_disabled FAILED [ 46%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_login_with_pkce_enabled FAILED [ 46%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_media_js FAILED [ 46%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_provider_has_no_pkce_params PASSED [ 46%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_provider_has_pkce_params PASSED [ 46%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_token_auth PASSED [ 46%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_username_based_on_provider FAILED [ 46%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_username_based_on_provider_with_simple_name FAILED [ 46%] allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_username_conflict FAILED [ 46%] allauth/socialaccount/providers/facebook/tests.py::test_limited_token PASSED [ 46%] allauth/socialaccount/providers/feedly/tests.py::FeedlyTests::test_account_refresh_token_saved_next_login FAILED [ 46%] allauth/socialaccount/providers/feedly/tests.py::FeedlyTests::test_account_tokens FAILED [ 46%] allauth/socialaccount/providers/feedly/tests.py::FeedlyTests::test_authentication_error FAILED [ 46%] allauth/socialaccount/providers/feedly/tests.py::FeedlyTests::test_login FAILED [ 47%] allauth/socialaccount/providers/feedly/tests.py::FeedlyTests::test_login_with_pkce_disabled FAILED [ 47%] allauth/socialaccount/providers/feedly/tests.py::FeedlyTests::test_login_with_pkce_enabled FAILED [ 47%] allauth/socialaccount/providers/feedly/tests.py::FeedlyTests::test_provider_has_no_pkce_params PASSED [ 47%] allauth/socialaccount/providers/feedly/tests.py::FeedlyTests::test_provider_has_pkce_params PASSED [ 47%] allauth/socialaccount/providers/feishu/tests.py::FeishuTests::test_account_refresh_token_saved_next_login FAILED [ 47%] allauth/socialaccount/providers/feishu/tests.py::FeishuTests::test_account_tokens FAILED [ 47%] allauth/socialaccount/providers/feishu/tests.py::FeishuTests::test_authentication_error FAILED [ 47%] allauth/socialaccount/providers/feishu/tests.py::FeishuTests::test_login FAILED [ 47%] allauth/socialaccount/providers/feishu/tests.py::FeishuTests::test_login_with_pkce_disabled FAILED [ 47%] allauth/socialaccount/providers/feishu/tests.py::FeishuTests::test_login_with_pkce_enabled FAILED [ 47%] allauth/socialaccount/providers/feishu/tests.py::FeishuTests::test_provider_has_no_pkce_params PASSED [ 47%] allauth/socialaccount/providers/feishu/tests.py::FeishuTests::test_provider_has_pkce_params PASSED [ 47%] allauth/socialaccount/providers/figma/tests.py::FigmaTests::test_account_refresh_token_saved_next_login FAILED [ 47%] allauth/socialaccount/providers/figma/tests.py::FigmaTests::test_account_tokens FAILED [ 47%] allauth/socialaccount/providers/figma/tests.py::FigmaTests::test_authentication_error FAILED [ 48%] allauth/socialaccount/providers/figma/tests.py::FigmaTests::test_login FAILED [ 48%] allauth/socialaccount/providers/figma/tests.py::FigmaTests::test_login_with_pkce_disabled FAILED [ 48%] allauth/socialaccount/providers/figma/tests.py::FigmaTests::test_login_with_pkce_enabled FAILED [ 48%] allauth/socialaccount/providers/figma/tests.py::FigmaTests::test_provider_has_no_pkce_params PASSED [ 48%] allauth/socialaccount/providers/figma/tests.py::FigmaTests::test_provider_has_pkce_params PASSED [ 48%] allauth/socialaccount/providers/fivehundredpx/tests.py::FiveHundredPxTests::test_authentication_error FAILED [ 48%] allauth/socialaccount/providers/fivehundredpx/tests.py::FiveHundredPxTests::test_auto_signup FAILED [ 48%] allauth/socialaccount/providers/fivehundredpx/tests.py::FiveHundredPxTests::test_login FAILED [ 48%] allauth/socialaccount/providers/flickr/tests.py::FlickrTests::test_authentication_error FAILED [ 48%] allauth/socialaccount/providers/flickr/tests.py::FlickrTests::test_auto_signup FAILED [ 48%] allauth/socialaccount/providers/flickr/tests.py::FlickrTests::test_login FAILED [ 48%] allauth/socialaccount/providers/flickr/tests.py::FlickrWithoutRealNameTests::test_authentication_error FAILED [ 48%] allauth/socialaccount/providers/flickr/tests.py::FlickrWithoutRealNameTests::test_auto_signup FAILED [ 48%] allauth/socialaccount/providers/flickr/tests.py::FlickrWithoutRealNameTests::test_login FAILED [ 48%] allauth/socialaccount/providers/foursquare/tests.py::FoursquareTests::test_account_refresh_token_saved_next_login FAILED [ 49%] allauth/socialaccount/providers/foursquare/tests.py::FoursquareTests::test_account_tokens FAILED [ 49%] allauth/socialaccount/providers/foursquare/tests.py::FoursquareTests::test_authentication_error FAILED [ 49%] allauth/socialaccount/providers/foursquare/tests.py::FoursquareTests::test_login FAILED [ 49%] allauth/socialaccount/providers/foursquare/tests.py::FoursquareTests::test_login_with_pkce_disabled FAILED [ 49%] allauth/socialaccount/providers/foursquare/tests.py::FoursquareTests::test_login_with_pkce_enabled FAILED [ 49%] allauth/socialaccount/providers/foursquare/tests.py::FoursquareTests::test_provider_has_no_pkce_params PASSED [ 49%] allauth/socialaccount/providers/foursquare/tests.py::FoursquareTests::test_provider_has_pkce_params PASSED [ 49%] allauth/socialaccount/providers/frontier/tests.py::FrontierTests::test_account_refresh_token_saved_next_login FAILED [ 49%] allauth/socialaccount/providers/frontier/tests.py::FrontierTests::test_account_tokens FAILED [ 49%] allauth/socialaccount/providers/frontier/tests.py::FrontierTests::test_authentication_error FAILED [ 49%] allauth/socialaccount/providers/frontier/tests.py::FrontierTests::test_login FAILED [ 49%] allauth/socialaccount/providers/frontier/tests.py::FrontierTests::test_login_with_pkce_disabled FAILED [ 49%] allauth/socialaccount/providers/frontier/tests.py::FrontierTests::test_login_with_pkce_enabled FAILED [ 49%] allauth/socialaccount/providers/frontier/tests.py::FrontierTests::test_provider_has_no_pkce_params PASSED [ 49%] allauth/socialaccount/providers/frontier/tests.py::FrontierTests::test_provider_has_pkce_params PASSED [ 50%] allauth/socialaccount/providers/fxa/tests.py::FirefoxAccountsTests::test_account_refresh_token_saved_next_login FAILED [ 50%] allauth/socialaccount/providers/fxa/tests.py::FirefoxAccountsTests::test_account_tokens FAILED [ 50%] allauth/socialaccount/providers/fxa/tests.py::FirefoxAccountsTests::test_authentication_error FAILED [ 50%] allauth/socialaccount/providers/fxa/tests.py::FirefoxAccountsTests::test_login FAILED [ 50%] allauth/socialaccount/providers/fxa/tests.py::FirefoxAccountsTests::test_login_with_pkce_disabled FAILED [ 50%] allauth/socialaccount/providers/fxa/tests.py::FirefoxAccountsTests::test_login_with_pkce_enabled FAILED [ 50%] allauth/socialaccount/providers/fxa/tests.py::FirefoxAccountsTests::test_provider_has_no_pkce_params PASSED [ 50%] allauth/socialaccount/providers/fxa/tests.py::FirefoxAccountsTests::test_provider_has_pkce_params PASSED [ 50%] allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_account_name_null FAILED [ 50%] allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_account_refresh_token_saved_next_login FAILED [ 50%] allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_account_tokens FAILED [ 50%] allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_authentication_error FAILED [ 50%] allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_login FAILED [ 50%] allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_login_with_pkce_disabled FAILED [ 50%] allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_login_with_pkce_enabled FAILED [ 50%] allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_provider_has_no_pkce_params PASSED [ 51%] allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_provider_has_pkce_params PASSED [ 51%] allauth/socialaccount/providers/github/tests.py::GitHubTests::test_account_name_null FAILED [ 51%] allauth/socialaccount/providers/github/tests.py::GitHubTests::test_account_refresh_token_saved_next_login FAILED [ 51%] allauth/socialaccount/providers/github/tests.py::GitHubTests::test_account_tokens FAILED [ 51%] allauth/socialaccount/providers/github/tests.py::GitHubTests::test_authentication_error FAILED [ 51%] allauth/socialaccount/providers/github/tests.py::GitHubTests::test_login FAILED [ 51%] allauth/socialaccount/providers/github/tests.py::GitHubTests::test_login_with_pkce_disabled FAILED [ 51%] allauth/socialaccount/providers/github/tests.py::GitHubTests::test_login_with_pkce_enabled FAILED [ 51%] allauth/socialaccount/providers/github/tests.py::GitHubTests::test_provider_has_no_pkce_params PASSED [ 51%] allauth/socialaccount/providers/github/tests.py::GitHubTests::test_provider_has_pkce_params PASSED [ 51%] allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_account_invalid_response PASSED [ 51%] allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_account_refresh_token_saved_next_login FAILED [ 51%] allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_account_tokens FAILED [ 51%] allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_authentication_error FAILED [ 51%] allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_bad_response PASSED [ 52%] allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_error_response PASSED [ 52%] allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_extra_data FAILED [ 52%] allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_invalid_data PASSED [ 52%] allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_invalid_response PASSED [ 52%] allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_login FAILED [ 52%] allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_login_with_pkce_disabled FAILED [ 52%] allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_login_with_pkce_enabled FAILED [ 52%] allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_provider_has_no_pkce_params PASSED [ 52%] allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_provider_has_pkce_params PASSED [ 52%] allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_valid_response PASSED [ 52%] allauth/socialaccount/providers/globus/tests.py::GlobusTests::test_account_refresh_token_saved_next_login FAILED [ 52%] allauth/socialaccount/providers/globus/tests.py::GlobusTests::test_account_tokens FAILED [ 52%] allauth/socialaccount/providers/globus/tests.py::GlobusTests::test_authentication_error FAILED [ 52%] allauth/socialaccount/providers/globus/tests.py::GlobusTests::test_login FAILED [ 52%] allauth/socialaccount/providers/globus/tests.py::GlobusTests::test_login_with_pkce_disabled FAILED [ 53%] allauth/socialaccount/providers/globus/tests.py::GlobusTests::test_login_with_pkce_enabled FAILED [ 53%] allauth/socialaccount/providers/globus/tests.py::GlobusTests::test_provider_has_no_pkce_params PASSED [ 53%] allauth/socialaccount/providers/globus/tests.py::GlobusTests::test_provider_has_pkce_params PASSED [ 53%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_account_connect FAILED [ 53%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_account_refresh_token_saved_next_login FAILED [ 53%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_account_tokens FAILED [ 53%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_authentication_error FAILED [ 53%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_email_unverified FAILED [ 53%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_email_verified FAILED [ 53%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_email_verified_stashed FAILED [ 53%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_login FAILED [ 53%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_login_with_pkce_disabled PASSED [ 53%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_login_with_pkce_enabled PASSED [ 53%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_provider_has_no_pkce_params PASSED [ 53%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_provider_has_pkce_params PASSED [ 53%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_social_email_verification_optional FAILED [ 54%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_social_email_verification_skipped FAILED [ 54%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_user_signed_up_signal FAILED [ 54%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_username_based_on_email FAILED [ 54%] allauth/socialaccount/providers/google/tests.py::GoogleTests::test_wrong_id_token_claim_values FAILED [ 54%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_account_connect FAILED [ 54%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_account_refresh_token_saved_next_login FAILED [ 54%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_account_tokens FAILED [ 54%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_authentication_error FAILED [ 54%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_email_unverified FAILED [ 54%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_email_verified FAILED [ 54%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_email_verified_stashed FAILED [ 54%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_login FAILED [ 54%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_login_with_pkce_disabled PASSED [ 54%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_login_with_pkce_enabled PASSED [ 54%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_provider_has_no_pkce_params PASSED [ 55%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_provider_has_pkce_params PASSED [ 55%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_social_email_verification_optional FAILED [ 55%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_social_email_verification_skipped FAILED [ 55%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_user_signed_up_signal FAILED [ 55%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_username_based_on_email FAILED [ 55%] allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_wrong_id_token_claim_values FAILED [ 55%] allauth/socialaccount/providers/google/tests.py::test_login_by_token FAILED [ 55%] allauth/socialaccount/providers/google/tests.py::test_extract_data[False-id-email_verified] PASSED [ 55%] allauth/socialaccount/providers/google/tests.py::test_extract_data[False-sub-verified_email] PASSED [ 55%] allauth/socialaccount/providers/google/tests.py::test_extract_data[True-id-email_verified] PASSED [ 55%] allauth/socialaccount/providers/google/tests.py::test_extract_data[True-sub-verified_email] PASSED [ 55%] allauth/socialaccount/providers/google/tests.py::test_complete_login_variants[False-True-True-response0-uid-from-id-token-pic-from-id-token] PASSED [ 55%] allauth/socialaccount/providers/google/tests.py::test_complete_login_variants[False-True-False-response1-uid-from-id-token-pic-from-userinfo] PASSED [ 55%] allauth/socialaccount/providers/google/tests.py::test_complete_login_variants[False-True-True-response2-uid-from-userinfo-pic-from-userinfo] PASSED [ 55%] allauth/socialaccount/providers/google/tests.py::test_complete_login_variants[True-True-True-response0-uid-from-id-token-pic-from-id-token] PASSED [ 56%] allauth/socialaccount/providers/google/tests.py::test_complete_login_variants[True-True-False-response1-uid-from-id-token-pic-from-userinfo] PASSED [ 56%] allauth/socialaccount/providers/google/tests.py::test_complete_login_variants[True-True-True-response2-uid-from-userinfo-pic-from-userinfo] PASSED [ 56%] allauth/socialaccount/providers/gumroad/tests.py::GumroadTests::test_account_refresh_token_saved_next_login FAILED [ 56%] allauth/socialaccount/providers/gumroad/tests.py::GumroadTests::test_account_tokens FAILED [ 56%] allauth/socialaccount/providers/gumroad/tests.py::GumroadTests::test_authentication_error FAILED [ 56%] allauth/socialaccount/providers/gumroad/tests.py::GumroadTests::test_login FAILED [ 56%] allauth/socialaccount/providers/gumroad/tests.py::GumroadTests::test_login_with_pkce_disabled FAILED [ 56%] allauth/socialaccount/providers/gumroad/tests.py::GumroadTests::test_login_with_pkce_enabled FAILED [ 56%] allauth/socialaccount/providers/gumroad/tests.py::GumroadTests::test_provider_has_no_pkce_params PASSED [ 56%] allauth/socialaccount/providers/gumroad/tests.py::GumroadTests::test_provider_has_pkce_params PASSED [ 56%] allauth/socialaccount/providers/hubic/tests.py::HubicTests::test_account_refresh_token_saved_next_login FAILED [ 56%] allauth/socialaccount/providers/hubic/tests.py::HubicTests::test_account_tokens FAILED [ 56%] allauth/socialaccount/providers/hubic/tests.py::HubicTests::test_authentication_error FAILED [ 56%] allauth/socialaccount/providers/hubic/tests.py::HubicTests::test_login FAILED [ 56%] allauth/socialaccount/providers/hubic/tests.py::HubicTests::test_login_with_pkce_disabled FAILED [ 56%] allauth/socialaccount/providers/hubic/tests.py::HubicTests::test_login_with_pkce_enabled FAILED [ 57%] allauth/socialaccount/providers/hubic/tests.py::HubicTests::test_provider_has_no_pkce_params PASSED [ 57%] allauth/socialaccount/providers/hubic/tests.py::HubicTests::test_provider_has_pkce_params PASSED [ 57%] allauth/socialaccount/providers/hubspot/tests.py::HubspotTests::test_account_refresh_token_saved_next_login FAILED [ 57%] allauth/socialaccount/providers/hubspot/tests.py::HubspotTests::test_account_tokens FAILED [ 57%] allauth/socialaccount/providers/hubspot/tests.py::HubspotTests::test_authentication_error FAILED [ 57%] allauth/socialaccount/providers/hubspot/tests.py::HubspotTests::test_login FAILED [ 57%] allauth/socialaccount/providers/hubspot/tests.py::HubspotTests::test_login_with_pkce_disabled FAILED [ 57%] allauth/socialaccount/providers/hubspot/tests.py::HubspotTests::test_login_with_pkce_enabled FAILED [ 57%] allauth/socialaccount/providers/hubspot/tests.py::HubspotTests::test_provider_has_no_pkce_params PASSED [ 57%] allauth/socialaccount/providers/hubspot/tests.py::HubspotTests::test_provider_has_pkce_params PASSED [ 57%] allauth/socialaccount/providers/instagram/tests.py::InstagramTests::test_account_refresh_token_saved_next_login FAILED [ 57%] allauth/socialaccount/providers/instagram/tests.py::InstagramTests::test_account_tokens FAILED [ 57%] allauth/socialaccount/providers/instagram/tests.py::InstagramTests::test_authentication_error FAILED [ 57%] allauth/socialaccount/providers/instagram/tests.py::InstagramTests::test_login FAILED [ 57%] allauth/socialaccount/providers/instagram/tests.py::InstagramTests::test_login_with_pkce_disabled FAILED [ 58%] allauth/socialaccount/providers/instagram/tests.py::InstagramTests::test_login_with_pkce_enabled FAILED [ 58%] allauth/socialaccount/providers/instagram/tests.py::InstagramTests::test_provider_has_no_pkce_params PASSED [ 58%] allauth/socialaccount/providers/instagram/tests.py::InstagramTests::test_provider_has_pkce_params PASSED [ 58%] allauth/socialaccount/providers/jupyterhub/tests.py::JupyterHubTests::test_account_refresh_token_saved_next_login FAILED [ 58%] allauth/socialaccount/providers/jupyterhub/tests.py::JupyterHubTests::test_account_tokens FAILED [ 58%] allauth/socialaccount/providers/jupyterhub/tests.py::JupyterHubTests::test_authentication_error FAILED [ 58%] allauth/socialaccount/providers/jupyterhub/tests.py::JupyterHubTests::test_login FAILED [ 58%] allauth/socialaccount/providers/jupyterhub/tests.py::JupyterHubTests::test_login_with_pkce_disabled FAILED [ 58%] allauth/socialaccount/providers/jupyterhub/tests.py::JupyterHubTests::test_login_with_pkce_enabled FAILED [ 58%] allauth/socialaccount/providers/jupyterhub/tests.py::JupyterHubTests::test_provider_has_no_pkce_params PASSED [ 58%] allauth/socialaccount/providers/jupyterhub/tests.py::JupyterHubTests::test_provider_has_pkce_params PASSED [ 58%] allauth/socialaccount/providers/kakao/tests.py::KakaoTests::test_account_refresh_token_saved_next_login FAILED [ 58%] allauth/socialaccount/providers/kakao/tests.py::KakaoTests::test_account_tokens FAILED [ 58%] allauth/socialaccount/providers/kakao/tests.py::KakaoTests::test_authentication_error FAILED [ 58%] allauth/socialaccount/providers/kakao/tests.py::KakaoTests::test_login FAILED [ 59%] allauth/socialaccount/providers/kakao/tests.py::KakaoTests::test_login_with_pkce_disabled FAILED [ 59%] allauth/socialaccount/providers/kakao/tests.py::KakaoTests::test_login_with_pkce_enabled FAILED [ 59%] allauth/socialaccount/providers/kakao/tests.py::KakaoTests::test_provider_has_no_pkce_params PASSED [ 59%] allauth/socialaccount/providers/kakao/tests.py::KakaoTests::test_provider_has_pkce_params PASSED [ 59%] allauth/socialaccount/providers/lemonldap/tests.py::LemonLDAPTests::test_account_refresh_token_saved_next_login FAILED [ 59%] allauth/socialaccount/providers/lemonldap/tests.py::LemonLDAPTests::test_account_tokens FAILED [ 59%] allauth/socialaccount/providers/lemonldap/tests.py::LemonLDAPTests::test_authentication_error FAILED [ 59%] allauth/socialaccount/providers/lemonldap/tests.py::LemonLDAPTests::test_login FAILED [ 59%] allauth/socialaccount/providers/lemonldap/tests.py::LemonLDAPTests::test_login_with_pkce_disabled FAILED [ 59%] allauth/socialaccount/providers/lemonldap/tests.py::LemonLDAPTests::test_login_with_pkce_enabled FAILED [ 59%] allauth/socialaccount/providers/lemonldap/tests.py::LemonLDAPTests::test_provider_has_no_pkce_params PASSED [ 59%] allauth/socialaccount/providers/lemonldap/tests.py::LemonLDAPTests::test_provider_has_pkce_params PASSED [ 59%] allauth/socialaccount/providers/lichess/tests.py::LichessTests::test_account_refresh_token_saved_next_login FAILED [ 59%] allauth/socialaccount/providers/lichess/tests.py::LichessTests::test_account_tokens FAILED [ 59%] allauth/socialaccount/providers/lichess/tests.py::LichessTests::test_authentication_error FAILED [ 60%] allauth/socialaccount/providers/lichess/tests.py::LichessTests::test_login FAILED [ 60%] allauth/socialaccount/providers/lichess/tests.py::LichessTests::test_login_with_pkce_disabled FAILED [ 60%] allauth/socialaccount/providers/lichess/tests.py::LichessTests::test_login_with_pkce_enabled FAILED [ 60%] allauth/socialaccount/providers/lichess/tests.py::LichessTests::test_provider_has_no_pkce_params PASSED [ 60%] allauth/socialaccount/providers/lichess/tests.py::LichessTests::test_provider_has_pkce_params PASSED [ 60%] allauth/socialaccount/providers/line/tests.py::LineTests::test_account_refresh_token_saved_next_login FAILED [ 60%] allauth/socialaccount/providers/line/tests.py::LineTests::test_account_tokens FAILED [ 60%] allauth/socialaccount/providers/line/tests.py::LineTests::test_authentication_error FAILED [ 60%] allauth/socialaccount/providers/line/tests.py::LineTests::test_login FAILED [ 60%] allauth/socialaccount/providers/line/tests.py::LineTests::test_login_with_pkce_disabled FAILED [ 60%] allauth/socialaccount/providers/line/tests.py::LineTests::test_login_with_pkce_enabled FAILED [ 60%] allauth/socialaccount/providers/line/tests.py::LineTests::test_provider_has_no_pkce_params PASSED [ 60%] allauth/socialaccount/providers/line/tests.py::LineTests::test_provider_has_pkce_params PASSED [ 60%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_account_refresh_token_saved_next_login FAILED [ 60%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_account_tokens FAILED [ 60%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_authentication_error FAILED [ 61%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_data_to_str PASSED [ 61%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_get_avatar_url_auth_mismatch PASSED [ 61%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_get_avatar_url_float_vs_int PASSED [ 61%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_get_avatar_url_no_picture_setting PASSED [ 61%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_get_avatar_url_size_mismatch PASSED [ 61%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_get_avatar_url_with_picture PASSED [ 61%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_get_avatar_url_with_setting PASSED [ 61%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_id_missing PASSED [ 61%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_login FAILED [ 61%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_login_with_pkce_disabled FAILED [ 61%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_login_with_pkce_enabled FAILED [ 61%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_provider_has_no_pkce_params PASSED [ 61%] allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_provider_has_pkce_params PASSED [ 61%] allauth/socialaccount/providers/mailchimp/tests.py::MailChimpTests::test_account_refresh_token_saved_next_login FAILED [ 61%] allauth/socialaccount/providers/mailchimp/tests.py::MailChimpTests::test_account_tokens FAILED [ 62%] allauth/socialaccount/providers/mailchimp/tests.py::MailChimpTests::test_authentication_error FAILED [ 62%] allauth/socialaccount/providers/mailchimp/tests.py::MailChimpTests::test_login FAILED [ 62%] allauth/socialaccount/providers/mailchimp/tests.py::MailChimpTests::test_login_with_pkce_disabled FAILED [ 62%] allauth/socialaccount/providers/mailchimp/tests.py::MailChimpTests::test_login_with_pkce_enabled FAILED [ 62%] allauth/socialaccount/providers/mailchimp/tests.py::MailChimpTests::test_provider_has_no_pkce_params PASSED [ 62%] allauth/socialaccount/providers/mailchimp/tests.py::MailChimpTests::test_provider_has_pkce_params PASSED [ 62%] allauth/socialaccount/providers/mailru/tests.py::MailRuTests::test_account_refresh_token_saved_next_login FAILED [ 62%] allauth/socialaccount/providers/mailru/tests.py::MailRuTests::test_account_tokens FAILED [ 62%] allauth/socialaccount/providers/mailru/tests.py::MailRuTests::test_authentication_error FAILED [ 62%] allauth/socialaccount/providers/mailru/tests.py::MailRuTests::test_login FAILED [ 62%] allauth/socialaccount/providers/mailru/tests.py::MailRuTests::test_login_with_pkce_disabled FAILED [ 62%] allauth/socialaccount/providers/mailru/tests.py::MailRuTests::test_login_with_pkce_enabled FAILED [ 62%] allauth/socialaccount/providers/mailru/tests.py::MailRuTests::test_provider_has_no_pkce_params PASSED [ 62%] allauth/socialaccount/providers/mailru/tests.py::MailRuTests::test_provider_has_pkce_params PASSED [ 62%] allauth/socialaccount/providers/mediawiki/tests.py::MediaWikiTests::test_account_refresh_token_saved_next_login FAILED [ 63%] allauth/socialaccount/providers/mediawiki/tests.py::MediaWikiTests::test_account_tokens FAILED [ 63%] allauth/socialaccount/providers/mediawiki/tests.py::MediaWikiTests::test_authentication_error FAILED [ 63%] allauth/socialaccount/providers/mediawiki/tests.py::MediaWikiTests::test_login FAILED [ 63%] allauth/socialaccount/providers/mediawiki/tests.py::MediaWikiTests::test_login_with_pkce_disabled FAILED [ 63%] allauth/socialaccount/providers/mediawiki/tests.py::MediaWikiTests::test_login_with_pkce_enabled FAILED [ 63%] allauth/socialaccount/providers/mediawiki/tests.py::MediaWikiTests::test_provider_has_no_pkce_params PASSED [ 63%] allauth/socialaccount/providers/mediawiki/tests.py::MediaWikiTests::test_provider_has_pkce_params PASSED [ 63%] allauth/socialaccount/providers/meetup/tests.py::MeetupTests::test_account_refresh_token_saved_next_login FAILED [ 63%] allauth/socialaccount/providers/meetup/tests.py::MeetupTests::test_account_tokens FAILED [ 63%] allauth/socialaccount/providers/meetup/tests.py::MeetupTests::test_authentication_error FAILED [ 63%] allauth/socialaccount/providers/meetup/tests.py::MeetupTests::test_login FAILED [ 63%] allauth/socialaccount/providers/meetup/tests.py::MeetupTests::test_login_with_pkce_disabled FAILED [ 63%] allauth/socialaccount/providers/meetup/tests.py::MeetupTests::test_login_with_pkce_enabled FAILED [ 63%] allauth/socialaccount/providers/meetup/tests.py::MeetupTests::test_provider_has_no_pkce_params PASSED [ 63%] allauth/socialaccount/providers/meetup/tests.py::MeetupTests::test_provider_has_pkce_params PASSED [ 63%] allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_account_refresh_token_saved_next_login FAILED [ 64%] allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_account_tokens FAILED [ 64%] allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_authentication_error FAILED [ 64%] allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_invalid_data PASSED [ 64%] allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_invalid_response PASSED [ 64%] allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_login FAILED [ 64%] allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_login_with_pkce_disabled FAILED [ 64%] allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_login_with_pkce_enabled FAILED [ 64%] allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_profile_invalid_response PASSED [ 64%] allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_provider_has_no_pkce_params PASSED [ 64%] allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_provider_has_pkce_params PASSED [ 64%] allauth/socialaccount/providers/miro/tests.py::MiroTests::test_account_refresh_token_saved_next_login FAILED [ 64%] allauth/socialaccount/providers/miro/tests.py::MiroTests::test_account_tokens FAILED [ 64%] allauth/socialaccount/providers/miro/tests.py::MiroTests::test_authentication_error FAILED [ 64%] allauth/socialaccount/providers/miro/tests.py::MiroTests::test_login FAILED [ 64%] allauth/socialaccount/providers/miro/tests.py::MiroTests::test_login_with_pkce_disabled FAILED [ 65%] allauth/socialaccount/providers/miro/tests.py::MiroTests::test_login_with_pkce_enabled FAILED [ 65%] allauth/socialaccount/providers/miro/tests.py::MiroTests::test_provider_has_no_pkce_params PASSED [ 65%] allauth/socialaccount/providers/miro/tests.py::MiroTests::test_provider_has_pkce_params PASSED [ 65%] allauth/socialaccount/providers/naver/tests.py::NaverTests::test_account_refresh_token_saved_next_login FAILED [ 65%] allauth/socialaccount/providers/naver/tests.py::NaverTests::test_account_tokens FAILED [ 65%] allauth/socialaccount/providers/naver/tests.py::NaverTests::test_authentication_error FAILED [ 65%] allauth/socialaccount/providers/naver/tests.py::NaverTests::test_login FAILED [ 65%] allauth/socialaccount/providers/naver/tests.py::NaverTests::test_login_with_pkce_disabled FAILED [ 65%] allauth/socialaccount/providers/naver/tests.py::NaverTests::test_login_with_pkce_enabled FAILED [ 65%] allauth/socialaccount/providers/naver/tests.py::NaverTests::test_provider_has_no_pkce_params PASSED [ 65%] allauth/socialaccount/providers/naver/tests.py::NaverTests::test_provider_has_pkce_params PASSED [ 65%] allauth/socialaccount/providers/netiq/tests.py::NetIQTests::test_account_refresh_token_saved_next_login FAILED [ 65%] allauth/socialaccount/providers/netiq/tests.py::NetIQTests::test_account_tokens FAILED [ 65%] allauth/socialaccount/providers/netiq/tests.py::NetIQTests::test_authentication_error FAILED [ 65%] allauth/socialaccount/providers/netiq/tests.py::NetIQTests::test_login FAILED [ 66%] allauth/socialaccount/providers/netiq/tests.py::NetIQTests::test_login_with_pkce_disabled FAILED [ 66%] allauth/socialaccount/providers/netiq/tests.py::NetIQTests::test_login_with_pkce_enabled FAILED [ 66%] allauth/socialaccount/providers/netiq/tests.py::NetIQTests::test_provider_has_no_pkce_params PASSED [ 66%] allauth/socialaccount/providers/netiq/tests.py::NetIQTests::test_provider_has_pkce_params PASSED [ 66%] allauth/socialaccount/providers/nextcloud/tests.py::NextCloudTests::test_account_refresh_token_saved_next_login FAILED [ 66%] allauth/socialaccount/providers/nextcloud/tests.py::NextCloudTests::test_account_tokens FAILED [ 66%] allauth/socialaccount/providers/nextcloud/tests.py::NextCloudTests::test_authentication_error FAILED [ 66%] allauth/socialaccount/providers/nextcloud/tests.py::NextCloudTests::test_login FAILED [ 66%] allauth/socialaccount/providers/nextcloud/tests.py::NextCloudTests::test_login_with_pkce_disabled FAILED [ 66%] allauth/socialaccount/providers/nextcloud/tests.py::NextCloudTests::test_login_with_pkce_enabled FAILED [ 66%] allauth/socialaccount/providers/nextcloud/tests.py::NextCloudTests::test_provider_has_no_pkce_params PASSED [ 66%] allauth/socialaccount/providers/nextcloud/tests.py::NextCloudTests::test_provider_has_pkce_params PASSED [ 66%] allauth/socialaccount/providers/notion/tests.py::NotionTests::test_account_refresh_token_saved_next_login FAILED [ 66%] allauth/socialaccount/providers/notion/tests.py::NotionTests::test_account_tokens FAILED [ 66%] allauth/socialaccount/providers/notion/tests.py::NotionTests::test_authentication_error FAILED [ 66%] allauth/socialaccount/providers/notion/tests.py::NotionTests::test_login FAILED [ 67%] allauth/socialaccount/providers/notion/tests.py::NotionTests::test_login_with_pkce_disabled FAILED [ 67%] allauth/socialaccount/providers/notion/tests.py::NotionTests::test_login_with_pkce_enabled FAILED [ 67%] allauth/socialaccount/providers/notion/tests.py::NotionTests::test_provider_has_no_pkce_params PASSED [ 67%] allauth/socialaccount/providers/notion/tests.py::NotionTests::test_provider_has_pkce_params PASSED [ 67%] allauth/socialaccount/providers/oauth2/tests/test_views.py::test_samesite_strict[True-False-True] FAILED [ 67%] allauth/socialaccount/providers/oauth2/tests/test_views.py::test_samesite_strict[True-True-False] FAILED [ 67%] allauth/socialaccount/providers/oauth2/tests/test_views.py::test_samesite_strict[False-False-False] FAILED [ 67%] allauth/socialaccount/providers/oauth2/tests/test_views.py::test_config_from_app_settings[False] PASSED [ 67%] allauth/socialaccount/providers/oauth2/tests/test_views.py::test_config_from_app_settings[True] PASSED [ 67%] allauth/socialaccount/providers/oauth2/tests/test_views.py::test_config_from_provider_config[False] PASSED [ 67%] allauth/socialaccount/providers/oauth2/tests/test_views.py::test_config_from_provider_config[True] PASSED [ 67%] allauth/socialaccount/providers/odnoklassniki/tests.py::OdnoklassnikiTests::test_account_refresh_token_saved_next_login FAILED [ 67%] allauth/socialaccount/providers/odnoklassniki/tests.py::OdnoklassnikiTests::test_account_tokens FAILED [ 67%] allauth/socialaccount/providers/odnoklassniki/tests.py::OdnoklassnikiTests::test_authentication_error FAILED [ 67%] allauth/socialaccount/providers/odnoklassniki/tests.py::OdnoklassnikiTests::test_login FAILED [ 68%] allauth/socialaccount/providers/odnoklassniki/tests.py::OdnoklassnikiTests::test_login_with_pkce_disabled FAILED [ 68%] allauth/socialaccount/providers/odnoklassniki/tests.py::OdnoklassnikiTests::test_login_with_pkce_enabled FAILED [ 68%] allauth/socialaccount/providers/odnoklassniki/tests.py::OdnoklassnikiTests::test_provider_has_no_pkce_params PASSED [ 68%] allauth/socialaccount/providers/odnoklassniki/tests.py::OdnoklassnikiTests::test_provider_has_pkce_params PASSED [ 68%] allauth/socialaccount/providers/okta/tests.py::OktaTests::test_account_refresh_token_saved_next_login FAILED [ 68%] allauth/socialaccount/providers/okta/tests.py::OktaTests::test_account_tokens FAILED [ 68%] allauth/socialaccount/providers/okta/tests.py::OktaTests::test_authentication_error FAILED [ 68%] allauth/socialaccount/providers/okta/tests.py::OktaTests::test_login FAILED [ 68%] allauth/socialaccount/providers/okta/tests.py::OktaTests::test_login_with_pkce_disabled FAILED [ 68%] allauth/socialaccount/providers/okta/tests.py::OktaTests::test_login_with_pkce_enabled FAILED [ 68%] allauth/socialaccount/providers/okta/tests.py::OktaTests::test_provider_has_no_pkce_params PASSED [ 68%] allauth/socialaccount/providers/okta/tests.py::OktaTests::test_provider_has_pkce_params PASSED [ 68%] allauth/socialaccount/providers/openid/tests.py::OpenIDTests::test_discovery_failure FAILED [ 68%] allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_account_refresh_token_saved_next_login FAILED [ 68%] allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_account_tokens FAILED [ 69%] allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_authentication_error FAILED [ 69%] allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_login FAILED [ 69%] allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_login_auto_signup FAILED [ 69%] allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_login_with_pkce_disabled FAILED [ 69%] allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_login_with_pkce_enabled FAILED [ 69%] allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_provider_has_no_pkce_params PASSED [ 69%] allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_provider_has_pkce_params PASSED [ 69%] allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_account_refresh_token_saved_next_login FAILED [ 69%] allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_account_tokens FAILED [ 69%] allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_authentication_error FAILED [ 69%] allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_login FAILED [ 69%] allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_login_auto_signup FAILED [ 69%] allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_login_with_pkce_disabled FAILED [ 69%] allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_login_with_pkce_enabled FAILED [ 69%] allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_provider_has_no_pkce_params PASSED [ 70%] allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_provider_has_pkce_params PASSED [ 70%] allauth/socialaccount/providers/openstreetmap/tests.py::OpenStreetMapTests::test_authentication_error FAILED [ 70%] allauth/socialaccount/providers/openstreetmap/tests.py::OpenStreetMapTests::test_auto_signup FAILED [ 70%] allauth/socialaccount/providers/openstreetmap/tests.py::OpenStreetMapTests::test_login FAILED [ 70%] allauth/socialaccount/providers/orcid/tests.py::OrcidTests::test_account_refresh_token_saved_next_login FAILED [ 70%] allauth/socialaccount/providers/orcid/tests.py::OrcidTests::test_account_tokens FAILED [ 70%] allauth/socialaccount/providers/orcid/tests.py::OrcidTests::test_authentication_error FAILED [ 70%] allauth/socialaccount/providers/orcid/tests.py::OrcidTests::test_login FAILED [ 70%] allauth/socialaccount/providers/orcid/tests.py::OrcidTests::test_login_with_pkce_disabled FAILED [ 70%] allauth/socialaccount/providers/orcid/tests.py::OrcidTests::test_login_with_pkce_enabled FAILED [ 70%] allauth/socialaccount/providers/orcid/tests.py::OrcidTests::test_provider_has_no_pkce_params PASSED [ 70%] allauth/socialaccount/providers/orcid/tests.py::OrcidTests::test_provider_has_pkce_params PASSED [ 70%] allauth/socialaccount/providers/patreon/tests.py::PatreonTests::test_account_refresh_token_saved_next_login FAILED [ 70%] allauth/socialaccount/providers/patreon/tests.py::PatreonTests::test_account_tokens FAILED [ 70%] allauth/socialaccount/providers/patreon/tests.py::PatreonTests::test_authentication_error FAILED [ 70%] allauth/socialaccount/providers/patreon/tests.py::PatreonTests::test_login FAILED [ 71%] allauth/socialaccount/providers/patreon/tests.py::PatreonTests::test_login_with_pkce_disabled FAILED [ 71%] allauth/socialaccount/providers/patreon/tests.py::PatreonTests::test_login_with_pkce_enabled FAILED [ 71%] allauth/socialaccount/providers/patreon/tests.py::PatreonTests::test_provider_has_no_pkce_params PASSED [ 71%] allauth/socialaccount/providers/patreon/tests.py::PatreonTests::test_provider_has_pkce_params PASSED [ 71%] allauth/socialaccount/providers/paypal/tests.py::PaypalTests::test_account_refresh_token_saved_next_login FAILED [ 71%] allauth/socialaccount/providers/paypal/tests.py::PaypalTests::test_account_tokens FAILED [ 71%] allauth/socialaccount/providers/paypal/tests.py::PaypalTests::test_authentication_error FAILED [ 71%] allauth/socialaccount/providers/paypal/tests.py::PaypalTests::test_login FAILED [ 71%] allauth/socialaccount/providers/paypal/tests.py::PaypalTests::test_login_with_pkce_disabled FAILED [ 71%] allauth/socialaccount/providers/paypal/tests.py::PaypalTests::test_login_with_pkce_enabled FAILED [ 71%] allauth/socialaccount/providers/paypal/tests.py::PaypalTests::test_provider_has_no_pkce_params PASSED [ 71%] allauth/socialaccount/providers/paypal/tests.py::PaypalTests::test_provider_has_pkce_params PASSED [ 71%] allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_account_refresh_token_saved_next_login FAILED [ 71%] allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_account_tokens FAILED [ 71%] allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_authentication_error FAILED [ 72%] allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_login FAILED [ 72%] allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_login_v5 FAILED [ 72%] allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_login_with_pkce_disabled FAILED [ 72%] allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_login_with_pkce_enabled FAILED [ 72%] allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_provider_has_no_pkce_params PASSED [ 72%] allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_provider_has_pkce_params PASSED [ 72%] allauth/socialaccount/providers/pocket/tests.py::PocketOAuthTests::test_authentication_error FAILED [ 72%] allauth/socialaccount/providers/pocket/tests.py::PocketOAuthTests::test_auto_signup PASSED [ 72%] allauth/socialaccount/providers/pocket/tests.py::PocketOAuthTests::test_login FAILED [ 72%] allauth/socialaccount/providers/questrade/tests.py::QuestradeTests::test_account_refresh_token_saved_next_login FAILED [ 72%] allauth/socialaccount/providers/questrade/tests.py::QuestradeTests::test_account_tokens FAILED [ 72%] allauth/socialaccount/providers/questrade/tests.py::QuestradeTests::test_authentication_error FAILED [ 72%] allauth/socialaccount/providers/questrade/tests.py::QuestradeTests::test_login FAILED [ 72%] allauth/socialaccount/providers/questrade/tests.py::QuestradeTests::test_login_with_pkce_disabled FAILED [ 72%] allauth/socialaccount/providers/questrade/tests.py::QuestradeTests::test_login_with_pkce_enabled FAILED [ 73%] allauth/socialaccount/providers/questrade/tests.py::QuestradeTests::test_provider_has_no_pkce_params PASSED [ 73%] allauth/socialaccount/providers/questrade/tests.py::QuestradeTests::test_provider_has_pkce_params PASSED [ 73%] allauth/socialaccount/providers/quickbooks/tests.py::QuickBooksOAuth2Tests::test_account_refresh_token_saved_next_login FAILED [ 73%] allauth/socialaccount/providers/quickbooks/tests.py::QuickBooksOAuth2Tests::test_account_tokens FAILED [ 73%] allauth/socialaccount/providers/quickbooks/tests.py::QuickBooksOAuth2Tests::test_authentication_error FAILED [ 73%] allauth/socialaccount/providers/quickbooks/tests.py::QuickBooksOAuth2Tests::test_login FAILED [ 73%] allauth/socialaccount/providers/quickbooks/tests.py::QuickBooksOAuth2Tests::test_login_with_pkce_disabled FAILED [ 73%] allauth/socialaccount/providers/quickbooks/tests.py::QuickBooksOAuth2Tests::test_login_with_pkce_enabled FAILED [ 73%] allauth/socialaccount/providers/quickbooks/tests.py::QuickBooksOAuth2Tests::test_provider_has_no_pkce_params PASSED [ 73%] allauth/socialaccount/providers/quickbooks/tests.py::QuickBooksOAuth2Tests::test_provider_has_pkce_params PASSED [ 73%] allauth/socialaccount/providers/reddit/tests.py::RedditTests::test_account_refresh_token_saved_next_login FAILED [ 73%] allauth/socialaccount/providers/reddit/tests.py::RedditTests::test_account_tokens FAILED [ 73%] allauth/socialaccount/providers/reddit/tests.py::RedditTests::test_authentication_error FAILED [ 73%] allauth/socialaccount/providers/reddit/tests.py::RedditTests::test_login FAILED [ 73%] allauth/socialaccount/providers/reddit/tests.py::RedditTests::test_login_with_pkce_disabled FAILED [ 73%] allauth/socialaccount/providers/reddit/tests.py::RedditTests::test_login_with_pkce_enabled FAILED [ 74%] allauth/socialaccount/providers/reddit/tests.py::RedditTests::test_provider_has_no_pkce_params PASSED [ 74%] allauth/socialaccount/providers/reddit/tests.py::RedditTests::test_provider_has_pkce_params PASSED [ 74%] allauth/socialaccount/providers/robinhood/tests.py::RobinhoodTests::test_account_refresh_token_saved_next_login FAILED [ 74%] allauth/socialaccount/providers/robinhood/tests.py::RobinhoodTests::test_account_tokens FAILED [ 74%] allauth/socialaccount/providers/robinhood/tests.py::RobinhoodTests::test_authentication_error FAILED [ 74%] allauth/socialaccount/providers/robinhood/tests.py::RobinhoodTests::test_login FAILED [ 74%] allauth/socialaccount/providers/robinhood/tests.py::RobinhoodTests::test_login_with_pkce_disabled FAILED [ 74%] allauth/socialaccount/providers/robinhood/tests.py::RobinhoodTests::test_login_with_pkce_enabled FAILED [ 74%] allauth/socialaccount/providers/robinhood/tests.py::RobinhoodTests::test_provider_has_no_pkce_params PASSED [ 74%] allauth/socialaccount/providers/robinhood/tests.py::RobinhoodTests::test_provider_has_pkce_params PASSED [ 74%] allauth/socialaccount/providers/salesforce/tests.py::SalesforceTests::test_account_refresh_token_saved_next_login FAILED [ 74%] allauth/socialaccount/providers/salesforce/tests.py::SalesforceTests::test_account_tokens FAILED [ 74%] allauth/socialaccount/providers/salesforce/tests.py::SalesforceTests::test_authentication_error FAILED [ 74%] allauth/socialaccount/providers/salesforce/tests.py::SalesforceTests::test_login FAILED [ 74%] allauth/socialaccount/providers/salesforce/tests.py::SalesforceTests::test_login_with_pkce_disabled FAILED [ 75%] allauth/socialaccount/providers/salesforce/tests.py::SalesforceTests::test_login_with_pkce_enabled FAILED [ 75%] allauth/socialaccount/providers/salesforce/tests.py::SalesforceTests::test_provider_has_no_pkce_params PASSED [ 75%] allauth/socialaccount/providers/salesforce/tests.py::SalesforceTests::test_provider_has_pkce_params PASSED [ 75%] allauth/socialaccount/providers/saml/tests.py::test_acs[False-adv_settings0-state_kwargs0-/not/here-/accounts/profile/] FAILED [ 75%] allauth/socialaccount/providers/saml/tests.py::test_acs[False-adv_settings1-state_kwargs1-/not/here-/here] FAILED [ 75%] allauth/socialaccount/providers/saml/tests.py::test_acs[False-adv_settings2-state_kwargs2-/not/here-expected_url2] FAILED [ 75%] allauth/socialaccount/providers/saml/tests.py::test_acs[False-adv_settings3-state_kwargs3-/not/here-/here] FAILED [ 75%] allauth/socialaccount/providers/saml/tests.py::test_acs[True-adv_settings4-state_kwargs4-/set-by-idp-/set-by-idp] FAILED [ 75%] allauth/socialaccount/providers/saml/tests.py::test_acs[True-adv_settings5-state_kwargs5-not-a-url-/accounts/profile/] FAILED [ 75%] allauth/socialaccount/providers/saml/tests.py::test_acs[True-adv_settings6-state_kwargs6-/set-by-idp-/set-by-idp] FAILED [ 75%] allauth/socialaccount/providers/saml/tests.py::test_acs_error FAILED [ 75%] allauth/socialaccount/providers/saml/tests.py::test_acs_get FAILED [ 75%] allauth/socialaccount/providers/saml/tests.py::test_sls_get FAILED [ 75%] allauth/socialaccount/providers/saml/tests.py::test_login_on_get FAILED [ 75%] allauth/socialaccount/providers/saml/tests.py::test_login FAILED [ 76%] allauth/socialaccount/providers/saml/tests.py::test_metadata FAILED [ 76%] allauth/socialaccount/providers/saml/tests.py::test_sls FAILED [ 76%] allauth/socialaccount/providers/saml/tests.py::test_extract_attributes[data0-result0-123] PASSED [ 76%] allauth/socialaccount/providers/saml/tests.py::test_extract_attributes[data1-result1-nameid@saml.org] PASSED [ 76%] allauth/socialaccount/providers/sharefile/tests.py::ShareFileTests::test_account_refresh_token_saved_next_login FAILED [ 76%] allauth/socialaccount/providers/sharefile/tests.py::ShareFileTests::test_account_tokens FAILED [ 76%] allauth/socialaccount/providers/sharefile/tests.py::ShareFileTests::test_authentication_error FAILED [ 76%] allauth/socialaccount/providers/sharefile/tests.py::ShareFileTests::test_login FAILED [ 76%] allauth/socialaccount/providers/sharefile/tests.py::ShareFileTests::test_login_with_pkce_disabled FAILED [ 76%] allauth/socialaccount/providers/sharefile/tests.py::ShareFileTests::test_login_with_pkce_enabled FAILED [ 76%] allauth/socialaccount/providers/sharefile/tests.py::ShareFileTests::test_provider_has_no_pkce_params PASSED [ 76%] allauth/socialaccount/providers/sharefile/tests.py::ShareFileTests::test_provider_has_pkce_params PASSED [ 76%] allauth/socialaccount/providers/shopify/tests.py::ShopifyTests::test_account_refresh_token_saved_next_login FAILED [ 76%] allauth/socialaccount/providers/shopify/tests.py::ShopifyTests::test_account_tokens FAILED [ 76%] allauth/socialaccount/providers/shopify/tests.py::ShopifyTests::test_authentication_error FAILED [ 76%] allauth/socialaccount/providers/shopify/tests.py::ShopifyTests::test_login FAILED [ 77%] allauth/socialaccount/providers/shopify/tests.py::ShopifyTests::test_login_with_pkce_disabled FAILED [ 77%] allauth/socialaccount/providers/shopify/tests.py::ShopifyTests::test_login_with_pkce_enabled FAILED [ 77%] allauth/socialaccount/providers/shopify/tests.py::ShopifyTests::test_provider_has_no_pkce_params PASSED [ 77%] allauth/socialaccount/providers/shopify/tests.py::ShopifyTests::test_provider_has_pkce_params PASSED [ 77%] allauth/socialaccount/providers/shopify/tests.py::ShopifyEmbeddedTests::test_account_refresh_token_saved_next_login FAILED [ 77%] allauth/socialaccount/providers/shopify/tests.py::ShopifyEmbeddedTests::test_account_tokens FAILED [ 77%] allauth/socialaccount/providers/shopify/tests.py::ShopifyEmbeddedTests::test_authentication_error FAILED [ 77%] allauth/socialaccount/providers/shopify/tests.py::ShopifyEmbeddedTests::test_login FAILED [ 77%] allauth/socialaccount/providers/shopify/tests.py::ShopifyEmbeddedTests::test_login_with_pkce_disabled FAILED [ 77%] allauth/socialaccount/providers/shopify/tests.py::ShopifyEmbeddedTests::test_login_with_pkce_enabled FAILED [ 77%] allauth/socialaccount/providers/shopify/tests.py::ShopifyEmbeddedTests::test_provider_has_no_pkce_params PASSED [ 77%] allauth/socialaccount/providers/shopify/tests.py::ShopifyEmbeddedTests::test_provider_has_pkce_params PASSED [ 77%] allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_account_refresh_token_saved_next_login FAILED [ 77%] allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_account_tokens FAILED [ 77%] allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_associated_user FAILED [ 78%] allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_authentication_error FAILED [ 78%] allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_login FAILED [ 78%] allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_login_with_pkce_disabled FAILED [ 78%] allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_login_with_pkce_enabled FAILED [ 78%] allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_provider_has_no_pkce_params PASSED [ 78%] allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_provider_has_pkce_params PASSED [ 78%] allauth/socialaccount/providers/slack/tests.py::SlackOAuth2Tests::test_account_refresh_token_saved_next_login FAILED [ 78%] allauth/socialaccount/providers/slack/tests.py::SlackOAuth2Tests::test_account_tokens FAILED [ 78%] allauth/socialaccount/providers/slack/tests.py::SlackOAuth2Tests::test_authentication_error FAILED [ 78%] allauth/socialaccount/providers/slack/tests.py::SlackOAuth2Tests::test_login FAILED [ 78%] allauth/socialaccount/providers/slack/tests.py::SlackOAuth2Tests::test_login_with_pkce_disabled FAILED [ 78%] allauth/socialaccount/providers/slack/tests.py::SlackOAuth2Tests::test_login_with_pkce_enabled FAILED [ 78%] allauth/socialaccount/providers/slack/tests.py::SlackOAuth2Tests::test_provider_has_no_pkce_params PASSED [ 78%] allauth/socialaccount/providers/slack/tests.py::SlackOAuth2Tests::test_provider_has_pkce_params PASSED [ 78%] allauth/socialaccount/providers/snapchat/tests.py::SnapchatOAuth2Tests::test_account_refresh_token_saved_next_login FAILED [ 79%] allauth/socialaccount/providers/snapchat/tests.py::SnapchatOAuth2Tests::test_account_tokens FAILED [ 79%] allauth/socialaccount/providers/snapchat/tests.py::SnapchatOAuth2Tests::test_authentication_error FAILED [ 79%] allauth/socialaccount/providers/snapchat/tests.py::SnapchatOAuth2Tests::test_login FAILED [ 79%] allauth/socialaccount/providers/snapchat/tests.py::SnapchatOAuth2Tests::test_login_with_pkce_disabled FAILED [ 79%] allauth/socialaccount/providers/snapchat/tests.py::SnapchatOAuth2Tests::test_login_with_pkce_enabled FAILED [ 79%] allauth/socialaccount/providers/snapchat/tests.py::SnapchatOAuth2Tests::test_provider_has_no_pkce_params PASSED [ 79%] allauth/socialaccount/providers/snapchat/tests.py::SnapchatOAuth2Tests::test_provider_has_pkce_params PASSED [ 79%] allauth/socialaccount/providers/soundcloud/tests.py::SoundCloudTests::test_account_refresh_token_saved_next_login FAILED [ 79%] allauth/socialaccount/providers/soundcloud/tests.py::SoundCloudTests::test_account_tokens FAILED [ 79%] allauth/socialaccount/providers/soundcloud/tests.py::SoundCloudTests::test_authentication_error FAILED [ 79%] allauth/socialaccount/providers/soundcloud/tests.py::SoundCloudTests::test_login FAILED [ 79%] allauth/socialaccount/providers/soundcloud/tests.py::SoundCloudTests::test_login_with_pkce_disabled FAILED [ 79%] allauth/socialaccount/providers/soundcloud/tests.py::SoundCloudTests::test_login_with_pkce_enabled FAILED [ 79%] allauth/socialaccount/providers/soundcloud/tests.py::SoundCloudTests::test_provider_has_no_pkce_params PASSED [ 79%] allauth/socialaccount/providers/soundcloud/tests.py::SoundCloudTests::test_provider_has_pkce_params PASSED [ 80%] allauth/socialaccount/providers/spotify/tests.py::SpotifyOAuth2Tests::test_account_refresh_token_saved_next_login FAILED [ 80%] allauth/socialaccount/providers/spotify/tests.py::SpotifyOAuth2Tests::test_account_tokens FAILED [ 80%] allauth/socialaccount/providers/spotify/tests.py::SpotifyOAuth2Tests::test_authentication_error FAILED [ 80%] allauth/socialaccount/providers/spotify/tests.py::SpotifyOAuth2Tests::test_login FAILED [ 80%] allauth/socialaccount/providers/spotify/tests.py::SpotifyOAuth2Tests::test_login_with_pkce_disabled FAILED [ 80%] allauth/socialaccount/providers/spotify/tests.py::SpotifyOAuth2Tests::test_login_with_pkce_enabled FAILED [ 80%] allauth/socialaccount/providers/spotify/tests.py::SpotifyOAuth2Tests::test_provider_has_no_pkce_params PASSED [ 80%] allauth/socialaccount/providers/spotify/tests.py::SpotifyOAuth2Tests::test_provider_has_pkce_params PASSED [ 80%] allauth/socialaccount/providers/stackexchange/tests.py::StackExchangeTests::test_account_refresh_token_saved_next_login FAILED [ 80%] allauth/socialaccount/providers/stackexchange/tests.py::StackExchangeTests::test_account_tokens FAILED [ 80%] allauth/socialaccount/providers/stackexchange/tests.py::StackExchangeTests::test_authentication_error FAILED [ 80%] allauth/socialaccount/providers/stackexchange/tests.py::StackExchangeTests::test_login FAILED [ 80%] allauth/socialaccount/providers/stackexchange/tests.py::StackExchangeTests::test_login_with_pkce_disabled FAILED [ 80%] allauth/socialaccount/providers/stackexchange/tests.py::StackExchangeTests::test_login_with_pkce_enabled FAILED [ 80%] allauth/socialaccount/providers/stackexchange/tests.py::StackExchangeTests::test_provider_has_no_pkce_params PASSED [ 80%] allauth/socialaccount/providers/stackexchange/tests.py::StackExchangeTests::test_provider_has_pkce_params PASSED [ 81%] allauth/socialaccount/providers/stocktwits/tests.py::StocktwitsTests::test_account_refresh_token_saved_next_login FAILED [ 81%] allauth/socialaccount/providers/stocktwits/tests.py::StocktwitsTests::test_account_tokens FAILED [ 81%] allauth/socialaccount/providers/stocktwits/tests.py::StocktwitsTests::test_authentication_error FAILED [ 81%] allauth/socialaccount/providers/stocktwits/tests.py::StocktwitsTests::test_login FAILED [ 81%] allauth/socialaccount/providers/stocktwits/tests.py::StocktwitsTests::test_login_with_pkce_disabled FAILED [ 81%] allauth/socialaccount/providers/stocktwits/tests.py::StocktwitsTests::test_login_with_pkce_enabled FAILED [ 81%] allauth/socialaccount/providers/stocktwits/tests.py::StocktwitsTests::test_provider_has_no_pkce_params PASSED [ 81%] allauth/socialaccount/providers/stocktwits/tests.py::StocktwitsTests::test_provider_has_pkce_params PASSED [ 81%] allauth/socialaccount/providers/strava/tests.py::StravaTests::test_account_refresh_token_saved_next_login FAILED [ 81%] allauth/socialaccount/providers/strava/tests.py::StravaTests::test_account_tokens FAILED [ 81%] allauth/socialaccount/providers/strava/tests.py::StravaTests::test_authentication_error FAILED [ 81%] allauth/socialaccount/providers/strava/tests.py::StravaTests::test_login FAILED [ 81%] allauth/socialaccount/providers/strava/tests.py::StravaTests::test_login_with_pkce_disabled FAILED [ 81%] allauth/socialaccount/providers/strava/tests.py::StravaTests::test_login_with_pkce_enabled FAILED [ 81%] allauth/socialaccount/providers/strava/tests.py::StravaTests::test_provider_has_no_pkce_params PASSED [ 82%] allauth/socialaccount/providers/strava/tests.py::StravaTests::test_provider_has_pkce_params PASSED [ 82%] allauth/socialaccount/providers/strava/tests.py::StravaTests::test_valid_avatar FAILED [ 82%] allauth/socialaccount/providers/stripe/tests.py::StripeTests::test_account_refresh_token_saved_next_login FAILED [ 82%] allauth/socialaccount/providers/stripe/tests.py::StripeTests::test_account_tokens FAILED [ 82%] allauth/socialaccount/providers/stripe/tests.py::StripeTests::test_authentication_error FAILED [ 82%] allauth/socialaccount/providers/stripe/tests.py::StripeTests::test_login FAILED [ 82%] allauth/socialaccount/providers/stripe/tests.py::StripeTests::test_login_with_pkce_disabled FAILED [ 82%] allauth/socialaccount/providers/stripe/tests.py::StripeTests::test_login_with_pkce_enabled FAILED [ 82%] allauth/socialaccount/providers/stripe/tests.py::StripeTests::test_provider_has_no_pkce_params PASSED [ 82%] allauth/socialaccount/providers/stripe/tests.py::StripeTests::test_provider_has_pkce_params PASSED [ 82%] allauth/socialaccount/providers/telegram/tests.py::test_login FAILED [ 82%] allauth/socialaccount/providers/telegram/tests.py::test_callback_get FAILED [ 82%] allauth/socialaccount/providers/telegram/tests.py::test_callback FAILED [ 82%] allauth/socialaccount/providers/tiktok/tests.py::TikTokTests::test_account_refresh_token_saved_next_login FAILED [ 82%] allauth/socialaccount/providers/tiktok/tests.py::TikTokTests::test_account_tokens FAILED [ 83%] allauth/socialaccount/providers/tiktok/tests.py::TikTokTests::test_authentication_error FAILED [ 83%] allauth/socialaccount/providers/tiktok/tests.py::TikTokTests::test_login FAILED [ 83%] allauth/socialaccount/providers/tiktok/tests.py::TikTokTests::test_login_with_pkce_disabled FAILED [ 83%] allauth/socialaccount/providers/tiktok/tests.py::TikTokTests::test_login_with_pkce_enabled FAILED [ 83%] allauth/socialaccount/providers/tiktok/tests.py::TikTokTests::test_provider_has_no_pkce_params PASSED [ 83%] allauth/socialaccount/providers/tiktok/tests.py::TikTokTests::test_provider_has_pkce_params PASSED [ 83%] allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_account_refresh_token_saved_next_login FAILED [ 83%] allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_account_tokens FAILED [ 83%] allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_authentication_error FAILED [ 83%] allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_default_use_sandbox_uri PASSED [ 83%] allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_login FAILED [ 83%] allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_login_with_pkce_disabled FAILED [ 83%] allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_login_with_pkce_enabled FAILED [ 83%] allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_provider_has_no_pkce_params PASSED [ 83%] allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_provider_has_pkce_params PASSED [ 83%] allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_scope_from_default PASSED [ 84%] allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_scope_from_settings PASSED [ 84%] allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_use_production_uri PASSED [ 84%] allauth/socialaccount/providers/trello/tests.py::TrelloTests::test_authentication_error FAILED [ 84%] allauth/socialaccount/providers/trello/tests.py::TrelloTests::test_auto_signup FAILED [ 84%] allauth/socialaccount/providers/trello/tests.py::TrelloTests::test_login FAILED [ 84%] allauth/socialaccount/providers/tumblr/tests.py::TumblrTests::test_authentication_error FAILED [ 84%] allauth/socialaccount/providers/tumblr/tests.py::TumblrTests::test_auto_signup FAILED [ 84%] allauth/socialaccount/providers/tumblr/tests.py::TumblrTests::test_login FAILED [ 84%] allauth/socialaccount/providers/twentythreeandme/tests.py::TwentyThreeAndMeTests::test_account_refresh_token_saved_next_login FAILED [ 84%] allauth/socialaccount/providers/twentythreeandme/tests.py::TwentyThreeAndMeTests::test_account_tokens FAILED [ 84%] allauth/socialaccount/providers/twentythreeandme/tests.py::TwentyThreeAndMeTests::test_authentication_error FAILED [ 84%] allauth/socialaccount/providers/twentythreeandme/tests.py::TwentyThreeAndMeTests::test_login FAILED [ 84%] allauth/socialaccount/providers/twentythreeandme/tests.py::TwentyThreeAndMeTests::test_login_with_pkce_disabled FAILED [ 84%] allauth/socialaccount/providers/twentythreeandme/tests.py::TwentyThreeAndMeTests::test_login_with_pkce_enabled FAILED [ 84%] allauth/socialaccount/providers/twentythreeandme/tests.py::TwentyThreeAndMeTests::test_provider_has_no_pkce_params PASSED [ 85%] allauth/socialaccount/providers/twentythreeandme/tests.py::TwentyThreeAndMeTests::test_provider_has_pkce_params PASSED [ 85%] allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_account_refresh_token_saved_next_login FAILED [ 85%] allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_account_tokens FAILED [ 85%] allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_authentication_error FAILED [ 85%] allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_empty_or_missing_data_key_raises_OAuth2Error FAILED [ 85%] allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_login FAILED [ 85%] allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_login_with_pkce_disabled FAILED [ 85%] allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_login_with_pkce_enabled FAILED [ 85%] allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_missing_twitch_id_raises_OAuth2Error FAILED [ 85%] allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_provider_has_no_pkce_params PASSED [ 85%] allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_provider_has_pkce_params PASSED [ 85%] allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_response_over_400_raises_OAuth2Error FAILED [ 85%] allauth/socialaccount/providers/twitter/tests.py::TwitterTests::test_authentication_error FAILED [ 85%] allauth/socialaccount/providers/twitter/tests.py::TwitterTests::test_auto_signup FAILED [ 85%] allauth/socialaccount/providers/twitter/tests.py::TwitterTests::test_login FAILED [ 86%] allauth/socialaccount/providers/twitter_oauth2/tests.py::TwitterOAuth2Tests::test_account_refresh_token_saved_next_login FAILED [ 86%] allauth/socialaccount/providers/twitter_oauth2/tests.py::TwitterOAuth2Tests::test_account_tokens FAILED [ 86%] allauth/socialaccount/providers/twitter_oauth2/tests.py::TwitterOAuth2Tests::test_authentication_error FAILED [ 86%] allauth/socialaccount/providers/twitter_oauth2/tests.py::TwitterOAuth2Tests::test_login FAILED [ 86%] allauth/socialaccount/providers/twitter_oauth2/tests.py::TwitterOAuth2Tests::test_login_with_pkce_disabled FAILED [ 86%] allauth/socialaccount/providers/twitter_oauth2/tests.py::TwitterOAuth2Tests::test_login_with_pkce_enabled FAILED [ 86%] allauth/socialaccount/providers/twitter_oauth2/tests.py::TwitterOAuth2Tests::test_provider_has_no_pkce_params PASSED [ 86%] allauth/socialaccount/providers/twitter_oauth2/tests.py::TwitterOAuth2Tests::test_provider_has_pkce_params PASSED [ 86%] allauth/socialaccount/providers/untappd/tests.py::UntappdTests::test_account_refresh_token_saved_next_login FAILED [ 86%] allauth/socialaccount/providers/untappd/tests.py::UntappdTests::test_account_tokens FAILED [ 86%] allauth/socialaccount/providers/untappd/tests.py::UntappdTests::test_authentication_error FAILED [ 86%] allauth/socialaccount/providers/untappd/tests.py::UntappdTests::test_login FAILED [ 86%] allauth/socialaccount/providers/untappd/tests.py::UntappdTests::test_login_with_pkce_disabled FAILED [ 86%] allauth/socialaccount/providers/untappd/tests.py::UntappdTests::test_login_with_pkce_enabled FAILED [ 86%] allauth/socialaccount/providers/untappd/tests.py::UntappdTests::test_provider_has_no_pkce_params PASSED [ 86%] allauth/socialaccount/providers/untappd/tests.py::UntappdTests::test_provider_has_pkce_params PASSED [ 87%] allauth/socialaccount/providers/vimeo/tests.py::VimeoTests::test_authentication_error FAILED [ 87%] allauth/socialaccount/providers/vimeo/tests.py::VimeoTests::test_auto_signup FAILED [ 87%] allauth/socialaccount/providers/vimeo/tests.py::VimeoTests::test_login FAILED [ 87%] allauth/socialaccount/providers/vimeo_oauth2/tests.py::VimeoOAuth2Tests::test_account_refresh_token_saved_next_login FAILED [ 87%] allauth/socialaccount/providers/vimeo_oauth2/tests.py::VimeoOAuth2Tests::test_account_tokens FAILED [ 87%] allauth/socialaccount/providers/vimeo_oauth2/tests.py::VimeoOAuth2Tests::test_authentication_error FAILED [ 87%] allauth/socialaccount/providers/vimeo_oauth2/tests.py::VimeoOAuth2Tests::test_login FAILED [ 87%] allauth/socialaccount/providers/vimeo_oauth2/tests.py::VimeoOAuth2Tests::test_login_with_pkce_disabled FAILED [ 87%] allauth/socialaccount/providers/vimeo_oauth2/tests.py::VimeoOAuth2Tests::test_login_with_pkce_enabled FAILED [ 87%] allauth/socialaccount/providers/vimeo_oauth2/tests.py::VimeoOAuth2Tests::test_provider_has_no_pkce_params PASSED [ 87%] allauth/socialaccount/providers/vimeo_oauth2/tests.py::VimeoOAuth2Tests::test_provider_has_pkce_params PASSED [ 87%] allauth/socialaccount/providers/vk/tests.py::VKTests::test_account_refresh_token_saved_next_login FAILED [ 87%] allauth/socialaccount/providers/vk/tests.py::VKTests::test_account_tokens FAILED [ 87%] allauth/socialaccount/providers/vk/tests.py::VKTests::test_authentication_error FAILED [ 87%] allauth/socialaccount/providers/vk/tests.py::VKTests::test_login FAILED [ 88%] allauth/socialaccount/providers/vk/tests.py::VKTests::test_login_with_pkce_disabled FAILED [ 88%] allauth/socialaccount/providers/vk/tests.py::VKTests::test_login_with_pkce_enabled FAILED [ 88%] allauth/socialaccount/providers/vk/tests.py::VKTests::test_provider_has_no_pkce_params PASSED [ 88%] allauth/socialaccount/providers/vk/tests.py::VKTests::test_provider_has_pkce_params PASSED [ 88%] allauth/socialaccount/providers/wahoo/tests.py::WahooTests::test_account_refresh_token_saved_next_login FAILED [ 88%] allauth/socialaccount/providers/wahoo/tests.py::WahooTests::test_account_tokens FAILED [ 88%] allauth/socialaccount/providers/wahoo/tests.py::WahooTests::test_authentication_error FAILED [ 88%] allauth/socialaccount/providers/wahoo/tests.py::WahooTests::test_login FAILED [ 88%] allauth/socialaccount/providers/wahoo/tests.py::WahooTests::test_login_with_pkce_disabled FAILED [ 88%] allauth/socialaccount/providers/wahoo/tests.py::WahooTests::test_login_with_pkce_enabled FAILED [ 88%] allauth/socialaccount/providers/wahoo/tests.py::WahooTests::test_provider_has_no_pkce_params PASSED [ 88%] allauth/socialaccount/providers/wahoo/tests.py::WahooTests::test_provider_has_pkce_params PASSED [ 88%] allauth/socialaccount/providers/weibo/tests.py::WeiboTests::test_account_refresh_token_saved_next_login FAILED [ 88%] allauth/socialaccount/providers/weibo/tests.py::WeiboTests::test_account_tokens FAILED [ 88%] allauth/socialaccount/providers/weibo/tests.py::WeiboTests::test_authentication_error FAILED [ 89%] allauth/socialaccount/providers/weibo/tests.py::WeiboTests::test_login FAILED [ 89%] allauth/socialaccount/providers/weibo/tests.py::WeiboTests::test_login_with_pkce_disabled FAILED [ 89%] allauth/socialaccount/providers/weibo/tests.py::WeiboTests::test_login_with_pkce_enabled FAILED [ 89%] allauth/socialaccount/providers/weibo/tests.py::WeiboTests::test_provider_has_no_pkce_params PASSED [ 89%] allauth/socialaccount/providers/weibo/tests.py::WeiboTests::test_provider_has_pkce_params PASSED [ 89%] allauth/socialaccount/providers/weixin/tests.py::WeixinTests::test_account_refresh_token_saved_next_login FAILED [ 89%] allauth/socialaccount/providers/weixin/tests.py::WeixinTests::test_account_tokens FAILED [ 89%] allauth/socialaccount/providers/weixin/tests.py::WeixinTests::test_authentication_error FAILED [ 89%] allauth/socialaccount/providers/weixin/tests.py::WeixinTests::test_login FAILED [ 89%] allauth/socialaccount/providers/weixin/tests.py::WeixinTests::test_login_with_pkce_disabled FAILED [ 89%] allauth/socialaccount/providers/weixin/tests.py::WeixinTests::test_login_with_pkce_enabled FAILED [ 89%] allauth/socialaccount/providers/weixin/tests.py::WeixinTests::test_provider_has_no_pkce_params PASSED [ 89%] allauth/socialaccount/providers/weixin/tests.py::WeixinTests::test_provider_has_pkce_params PASSED [ 89%] allauth/socialaccount/providers/windowslive/tests.py::WindowsLiveTests::test_account_refresh_token_saved_next_login FAILED [ 89%] allauth/socialaccount/providers/windowslive/tests.py::WindowsLiveTests::test_account_tokens FAILED [ 90%] allauth/socialaccount/providers/windowslive/tests.py::WindowsLiveTests::test_authentication_error FAILED [ 90%] allauth/socialaccount/providers/windowslive/tests.py::WindowsLiveTests::test_login FAILED [ 90%] allauth/socialaccount/providers/windowslive/tests.py::WindowsLiveTests::test_login_with_pkce_disabled FAILED [ 90%] allauth/socialaccount/providers/windowslive/tests.py::WindowsLiveTests::test_login_with_pkce_enabled FAILED [ 90%] allauth/socialaccount/providers/windowslive/tests.py::WindowsLiveTests::test_provider_has_no_pkce_params PASSED [ 90%] allauth/socialaccount/providers/windowslive/tests.py::WindowsLiveTests::test_provider_has_pkce_params PASSED [ 90%] allauth/socialaccount/providers/xing/tests.py::XingTests::test_authentication_error FAILED [ 90%] allauth/socialaccount/providers/xing/tests.py::XingTests::test_auto_signup FAILED [ 90%] allauth/socialaccount/providers/xing/tests.py::XingTests::test_login FAILED [ 90%] allauth/socialaccount/providers/yahoo/tests.py::YahooTests::test_account_refresh_token_saved_next_login FAILED [ 90%] allauth/socialaccount/providers/yahoo/tests.py::YahooTests::test_account_tokens FAILED [ 90%] allauth/socialaccount/providers/yahoo/tests.py::YahooTests::test_authentication_error FAILED [ 90%] allauth/socialaccount/providers/yahoo/tests.py::YahooTests::test_login FAILED [ 90%] allauth/socialaccount/providers/yahoo/tests.py::YahooTests::test_login_with_pkce_disabled FAILED [ 90%] allauth/socialaccount/providers/yahoo/tests.py::YahooTests::test_login_with_pkce_enabled FAILED [ 90%] allauth/socialaccount/providers/yahoo/tests.py::YahooTests::test_provider_has_no_pkce_params PASSED [ 91%] allauth/socialaccount/providers/yahoo/tests.py::YahooTests::test_provider_has_pkce_params PASSED [ 91%] allauth/socialaccount/providers/yandex/tests.py::YandexTests::test_account_refresh_token_saved_next_login FAILED [ 91%] allauth/socialaccount/providers/yandex/tests.py::YandexTests::test_account_tokens FAILED [ 91%] allauth/socialaccount/providers/yandex/tests.py::YandexTests::test_authentication_error FAILED [ 91%] allauth/socialaccount/providers/yandex/tests.py::YandexTests::test_login FAILED [ 91%] allauth/socialaccount/providers/yandex/tests.py::YandexTests::test_login_with_pkce_disabled FAILED [ 91%] allauth/socialaccount/providers/yandex/tests.py::YandexTests::test_login_with_pkce_enabled FAILED [ 91%] allauth/socialaccount/providers/yandex/tests.py::YandexTests::test_provider_has_no_pkce_params PASSED [ 91%] allauth/socialaccount/providers/yandex/tests.py::YandexTests::test_provider_has_pkce_params PASSED [ 91%] allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_account_refresh_token_saved_next_login FAILED [ 91%] allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_account_tokens FAILED [ 91%] allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_authentication_error FAILED [ 91%] allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_login FAILED [ 91%] allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_login_with_pkce_disabled FAILED [ 91%] allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_login_with_pkce_enabled FAILED [ 92%] allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_provider_has_no_pkce_params PASSED [ 92%] allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_provider_has_pkce_params PASSED [ 92%] allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_ynab_compelete_login_401 FAILED [ 92%] allauth/socialaccount/providers/zoho/tests.py::ZohoTests::test_account_refresh_token_saved_next_login FAILED [ 92%] allauth/socialaccount/providers/zoho/tests.py::ZohoTests::test_account_tokens FAILED [ 92%] allauth/socialaccount/providers/zoho/tests.py::ZohoTests::test_authentication_error FAILED [ 92%] allauth/socialaccount/providers/zoho/tests.py::ZohoTests::test_login FAILED [ 92%] allauth/socialaccount/providers/zoho/tests.py::ZohoTests::test_login_with_pkce_disabled FAILED [ 92%] allauth/socialaccount/providers/zoho/tests.py::ZohoTests::test_login_with_pkce_enabled FAILED [ 92%] allauth/socialaccount/providers/zoho/tests.py::ZohoTests::test_provider_has_no_pkce_params PASSED [ 92%] allauth/socialaccount/providers/zoho/tests.py::ZohoTests::test_provider_has_pkce_params PASSED [ 92%] allauth/socialaccount/providers/zoom/tests.py::ZoomTests::test_account_refresh_token_saved_next_login FAILED [ 92%] allauth/socialaccount/providers/zoom/tests.py::ZoomTests::test_account_tokens FAILED [ 92%] allauth/socialaccount/providers/zoom/tests.py::ZoomTests::test_authentication_error FAILED [ 92%] allauth/socialaccount/providers/zoom/tests.py::ZoomTests::test_login FAILED [ 93%] allauth/socialaccount/providers/zoom/tests.py::ZoomTests::test_login_with_pkce_disabled FAILED [ 93%] allauth/socialaccount/providers/zoom/tests.py::ZoomTests::test_login_with_pkce_enabled FAILED [ 93%] allauth/socialaccount/providers/zoom/tests.py::ZoomTests::test_provider_has_no_pkce_params PASSED [ 93%] allauth/socialaccount/providers/zoom/tests.py::ZoomTests::test_provider_has_pkce_params PASSED [ 93%] allauth/socialaccount/tests/test_adapter.py::test_generate_state_param FAILED [ 93%] allauth/socialaccount/tests/test_adapter.py::test_list_db_based_apps PASSED [ 93%] allauth/socialaccount/tests/test_adapter.py::test_list_settings_based_apps PASSED [ 93%] allauth/socialaccount/tests/test_connect.py::test_disconnect[False] FAILED [ 93%] allauth/socialaccount/tests/test_connect.py::test_disconnect[True] FAILED [ 93%] allauth/socialaccount/tests/test_connect.py::test_connect_with_reauthentication FAILED [ 93%] allauth/socialaccount/tests/test_connect.py::test_connect FAILED [ 93%] allauth/socialaccount/tests/test_connect.py::test_connect_vs_email_authentication[False-False-added] FAILED [ 93%] allauth/socialaccount/tests/test_connect.py::test_connect_vs_email_authentication[False-True-updated] FAILED [ 93%] allauth/socialaccount/tests/test_connect.py::test_connect_vs_email_authentication[True-False-added] FAILED [ 93%] allauth/socialaccount/tests/test_connect.py::test_connect_vs_email_authentication[True-True-updated] FAILED [ 93%] allauth/socialaccount/tests/test_login.py::test_email_authentication[off-False-False] FAILED [ 94%] allauth/socialaccount/tests/test_login.py::test_email_authentication[off-False-True] FAILED [ 94%] allauth/socialaccount/tests/test_login.py::test_email_authentication[off-True-False] FAILED [ 94%] allauth/socialaccount/tests/test_login.py::test_email_authentication[off-True-True] FAILED [ 94%] allauth/socialaccount/tests/test_login.py::test_email_authentication[on-global-False-False] FAILED [ 94%] allauth/socialaccount/tests/test_login.py::test_email_authentication[on-global-False-True] FAILED [ 94%] allauth/socialaccount/tests/test_login.py::test_email_authentication[on-global-True-False] FAILED [ 94%] allauth/socialaccount/tests/test_login.py::test_email_authentication[on-global-True-True] FAILED [ 94%] allauth/socialaccount/tests/test_login.py::test_email_authentication[on-provider-False-False] FAILED [ 94%] allauth/socialaccount/tests/test_login.py::test_email_authentication[on-provider-False-True] FAILED [ 94%] allauth/socialaccount/tests/test_login.py::test_email_authentication[on-provider-True-False] FAILED [ 94%] allauth/socialaccount/tests/test_login.py::test_email_authentication[on-provider-True-True] FAILED [ 94%] allauth/socialaccount/tests/test_login.py::test_record_authentication[login-True-False] FAILED [ 94%] allauth/socialaccount/tests/test_login.py::test_record_authentication[login-True-True] FAILED [ 94%] allauth/socialaccount/tests/test_login.py::test_record_authentication[connect-False-False] FAILED [ 94%] allauth/socialaccount/tests/test_login.py::test_record_authentication[connect-False-True] FAILED [ 95%] allauth/socialaccount/tests/test_registry.py::ProviderRegistryTests::test_load_provider_with_custom_app_config PASSED [ 95%] allauth/socialaccount/tests/test_registry.py::ProviderRegistryTests::test_load_provider_with_default_app_config PASSED [ 95%] allauth/socialaccount/tests/test_signup.py::test_email_address_created FAILED [ 95%] allauth/socialaccount/tests/test_signup.py::test_email_address_clash_username_required FAILED [ 95%] allauth/socialaccount/tests/test_signup.py::test_email_address_clash_username_not_required FAILED [ 95%] allauth/socialaccount/tests/test_signup.py::test_email_address_clash_username_auto_signup FAILED [ 95%] allauth/socialaccount/tests/test_signup.py::test_populate_username_in_blacklist FAILED [ 95%] allauth/socialaccount/tests/test_signup.py::test_verified_email_change_at_signup FAILED [ 95%] allauth/socialaccount/tests/test_signup.py::test_unverified_email_change_at_signup FAILED [ 95%] allauth/socialaccount/tests/test_signup.py::test_unique_email_validation_signup FAILED [ 95%] allauth/socialaccount/tests/test_signup.py::test_social_account_taken_at_signup FAILED [ 95%] allauth/socialaccount/tests/test_signup.py::test_email_address_required_missing_from_sociallogin FAILED [ 95%] allauth/socialaccount/tests/test_signup.py::test_email_address_conflict_at_social_signup_form FAILED [ 95%] allauth/socialaccount/tests/test_signup.py::test_email_address_conflict_during_auto_signup FAILED [ 95%] allauth/socialaccount/tests/test_signup.py::test_email_address_conflict_removes_conflicting_email FAILED [ 96%] allauth/socialaccount/tests/test_signup.py::test_signup_closed FAILED [ 96%] allauth/socialaccount/tests/test_utils.py::UtilTests::test_social_account_str_customized PASSED [ 96%] allauth/socialaccount/tests/test_utils.py::UtilTests::test_social_account_str_default PASSED [ 96%] allauth/tests.py::BasicTests::test_build_absolute_uri PASSED [ 96%] allauth/tests.py::BasicTests::test_email_validation PASSED [ 96%] allauth/tests.py::BasicTests::test_generate_unique_username PASSED [ 96%] allauth/tests.py::BasicTests::test_int_to_base36 PASSED [ 96%] allauth/tests.py::BasicTests::test_serializer PASSED [ 96%] allauth/tests.py::BasicTests::test_serializer_binary_field PASSED [ 96%] allauth/tests.py::BasicTests::test_templatetag_with_csrf_failure FAILED [ 96%] allauth/usersessions/tests/test_middleware.py::test_mw_without_request_user PASSED [ 96%] allauth/usersessions/tests/test_middleware.py::test_mw_with_request_user[False] PASSED [ 96%] allauth/usersessions/tests/test_middleware.py::test_mw_with_request_user[True] PASSED [ 96%] allauth/usersessions/tests/test_middleware.py::test_mw_with_anonymous_request_user PASSED [ 96%] allauth/usersessions/tests/test_middleware.py::test_mw_change_ip_and_useragent PASSED [ 96%] allauth/usersessions/tests/test_views.py::test_overall_flow FAILED [ 97%] allauth/usersessions/tests/test_views.py::test_change_password_updates_user_session[True] FAILED [ 97%] allauth/usersessions/tests/test_views.py::test_change_password_updates_user_session[False] FAILED [ 97%] examples/regular-django/example/demo/tests.py::SimpleTest::test_basic_addition PASSED [ 97%] allauth/account/tests/test_middleware.py::test_accounts_redirect_async_ctx FAILED [ 97%] allauth/account/tests/test_decorators.py::test_secure_admin_login_skips_admin_login_next FAILED [ 97%] allauth/account/tests/test_middleware.py::test_immediate_http_response PASSED [ 97%] allauth/core/internal/tests/test_httpkit.py::test_add_query_params[/-params0-/?foo=bar&v=1] PASSED [ 97%] allauth/core/internal/tests/test_httpkit.py::test_add_query_params[https://fqdn/?replace=this-params1-https://fqdn/?replace=that] PASSED [ 97%] allauth/core/internal/tests/test_httpkit.py::test_render_url[/foo-kwargs0-http://testserver/foo] PASSED [ 97%] allauth/core/internal/tests/test_httpkit.py::test_render_url[/foo?key={key}-kwargs1-http://testserver/foo?key=+] PASSED [ 97%] allauth/core/internal/tests/test_httpkit.py::test_render_url[/foo/{key}-kwargs2-http://testserver/foo/%20] PASSED [ 97%] allauth/core/internal/tests/test_httpkit.py::test_render_url[https://abs.org/foo?key={key}-kwargs3-https://abs.org/foo?key=+] PASSED [ 97%] allauth/core/internal/tests/test_httpkit.py::test_deserialize_request PASSED [ 97%] allauth/core/tests/test_ratelimit.py::test_parse[5/m-values0] PASSED [ 97%] allauth/core/tests/test_ratelimit.py::test_parse[5/m/user-values1] PASSED [ 98%] allauth/core/tests/test_ratelimit.py::test_parse[2/3.5m/key-values2] PASSED [ 98%] allauth/core/tests/test_ratelimit.py::test_parse[3/5m/user,20/0.5m/ip-values3] PASSED [ 98%] allauth/core/tests/test_ratelimit.py::test_parse[7/2h-values4] PASSED [ 98%] allauth/core/tests/test_ratelimit.py::test_parse[7/0.25d-values5] PASSED [ 98%] allauth/headless/account/tests/test_login.py::test_auth_password_input_error[app] FAILED [ 98%] allauth/headless/account/tests/test_login.py::test_auth_password_input_error[browser] FAILED [ 98%] allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow_wrong_key[app-get] FAILED [ 98%] allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow_wrong_key[app-post] FAILED [ 98%] allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow_wrong_key[browser-get] FAILED [ 98%] allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow_wrong_key[browser-post] FAILED [ 98%] allauth/mfa/base/tests/test_views.py::test_login_required_views[mfa_activate_totp] FAILED [ 98%] allauth/mfa/base/tests/test_views.py::test_login_required_views[mfa_index] FAILED [ 98%] allauth/mfa/base/tests/test_views.py::test_login_required_views[mfa_deactivate_totp] FAILED [ 98%] allauth/mfa/totp/tests/test_unit.py::test_totp_counters_from_time PASSED [ 98%] allauth/mfa/totp/tests/test_unit.py::test_totp_counters_from_time_with_tolerance PASSED [ 99%] allauth/mfa/totp/tests/test_unit.py::test_validate_with_tolerance PASSED [ 99%] allauth/mfa/webauthn/tests/test_views.py::test_get_passkey_login_challenge_redirects_if_not_ajax FAILED [ 99%] allauth/socialaccount/internal/tests/test_jwtkit.py::test_verify_and_decode PASSED [ 99%] allauth/socialaccount/internal/tests/test_statekit.py::test_get_oldest_state PASSED [ 99%] allauth/socialaccount/internal/tests/test_statekit.py::test_get_oldest_state_empty PASSED [ 99%] allauth/socialaccount/internal/tests/test_statekit.py::test_gc_states PASSED [ 99%] allauth/socialaccount/internal/tests/test_statekit.py::test_stashing PASSED [ 99%] allauth/socialaccount/providers/amazon_cognito/tests.py::test_convert_bool[True-True] PASSED [ 99%] allauth/socialaccount/providers/amazon_cognito/tests.py::test_convert_bool[true-True] PASSED [ 99%] allauth/socialaccount/providers/amazon_cognito/tests.py::test_convert_bool[false-False] PASSED [ 99%] allauth/socialaccount/providers/amazon_cognito/tests.py::test_convert_bool[False-False] PASSED [ 99%] allauth/socialaccount/providers/saml/tests.py::test_build_saml_config_without_metadata_url[provider_config0] FAILED [ 99%] allauth/socialaccount/providers/saml/tests.py::test_build_saml_config[provider_config0] FAILED [ 99%] allauth/socialaccount/providers/saml/tests.py::test_build_saml_config[provider_config1] FAILED [ 99%] allauth/socialaccount/tests/test_login.py::test_login_cancelled FAILED [100%] =================================== FAILURES =================================== ____________________________ test_adapter_pre_login ____________________________ settings = user = user_password = 'e780f201-9817-4d2e-892d-eb021b8a95e3' client = def test_adapter_pre_login(settings, user, user_password, client): settings.ACCOUNT_ADAPTER = ( "allauth.account.tests.test_adapter.PreLoginRedirectAccountAdapter" ) resp = client.post( > reverse("account_login"), {"login": user.username, "password": user_password}, ) allauth/account/tests/test_adapter.py:18: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ---------------------------- Captured stderr setup ----------------------------- Creating test database for alias 'default'... ______________________ test_ajax_headers[headers0-False] _______________________ db = None, client = headers = {}, ajax_expected = False @pytest.mark.parametrize( "headers,ajax_expected", [ ({}, False), ({"HTTP_X_REQUESTED_WITH": "XMLHttpRequest"}, True), ({"HTTP_ACCEPT": "application/json"}, True), ], ) def test_ajax_headers(db, client, headers, ajax_expected): resp = client.post( > reverse("account_signup"), { "username": "johndoe", "email": "john@example.org", "email2": "john@example.org", "password1": "johndoe", "password2": "johndoe", }, **headers, ) allauth/account/tests/test_ajax.py:22: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_ajax_headers[headers1-True] _______________________ db = None, client = headers = {'HTTP_X_REQUESTED_WITH': 'XMLHttpRequest'}, ajax_expected = True @pytest.mark.parametrize( "headers,ajax_expected", [ ({}, False), ({"HTTP_X_REQUESTED_WITH": "XMLHttpRequest"}, True), ({"HTTP_ACCEPT": "application/json"}, True), ], ) def test_ajax_headers(db, client, headers, ajax_expected): resp = client.post( > reverse("account_signup"), { "username": "johndoe", "email": "john@example.org", "email2": "john@example.org", "password1": "johndoe", "password2": "johndoe", }, **headers, ) allauth/account/tests/test_ajax.py:22: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_ajax_headers[headers2-True] _______________________ db = None, client = headers = {'HTTP_ACCEPT': 'application/json'}, ajax_expected = True @pytest.mark.parametrize( "headers,ajax_expected", [ ({}, False), ({"HTTP_X_REQUESTED_WITH": "XMLHttpRequest"}, True), ({"HTTP_ACCEPT": "application/json"}, True), ], ) def test_ajax_headers(db, client, headers, ajax_expected): resp = client.post( > reverse("account_signup"), { "username": "johndoe", "email": "john@example.org", "email2": "john@example.org", "password1": "johndoe", "password2": "johndoe", }, **headers, ) allauth/account/tests/test_ajax.py:22: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_ajax_password_reset ___________________________ client = user = , mailoutbox = [] def test_ajax_password_reset(client, user, mailoutbox): resp = client.post( > reverse("account_reset_password"), data={"email": user.email}, HTTP_X_REQUESTED_WITH="XMLHttpRequest", ) allauth/account/tests/test_ajax.py:45: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ test_ajax_login_fail _____________________________ client = , db = None def test_ajax_login_fail(client, db): resp = client.post( > reverse("account_login"), {}, HTTP_X_REQUESTED_WITH="XMLHttpRequest", ) allauth/account/tests/test_ajax.py:56: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_ajax_login_success ____________________________ settings = user = user_password = 'e8e14328-c4c0-4d87-9da5-28932efb014d' client = def test_ajax_login_success(settings, user, user_password, client): settings.ACCOUNT_EMAIL_VERIFICATION = app_settings.EmailVerificationMethod.OPTIONAL resp = client.post( > reverse("account_login"), {"login": user.username, "password": user_password}, HTTP_X_REQUESTED_WITH="XMLHttpRequest", ) allauth/account/tests/test_ajax.py:68: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________________ test_ajax_get _________________________________ auth_client = user = def test_ajax_get(auth_client, user): primary = EmailAddress.objects.filter(user=user).first() secondary = EmailAddress.objects.create( email="secondary@email.org", user=user, verified=False, primary=False ) resp = auth_client.get( > reverse("account_email"), HTTP_X_REQUESTED_WITH="XMLHttpRequest" ) allauth/account/tests/test_change_email.py:21: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________________ test_ajax_add _________________________________ auth_client = def test_ajax_add(auth_client): resp = auth_client.post( > reverse("account_email"), {"action_add": "", "email": "john3@example.org"}, HTTP_X_REQUESTED_WITH="XMLHttpRequest", ) allauth/account/tests/test_change_email.py:42: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ test_ajax_add_invalid _____________________________ auth_client = def test_ajax_add_invalid(auth_client): resp = auth_client.post( > reverse("account_email"), {"action_add": "", "email": "john3#example.org"}, HTTP_X_REQUESTED_WITH="XMLHttpRequest", ) allauth/account/tests/test_change_email.py:52: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_ajax_remove_primary ___________________________ auth_client = user = settings = def test_ajax_remove_primary(auth_client, user, settings): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" resp = auth_client.post( > reverse("account_email"), {"action_remove": "", "email": user.email}, HTTP_X_REQUESTED_WITH="XMLHttpRequest", ) allauth/account/tests/test_change_email.py:63: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ test_remove_secondary _____________________________ auth_client = user = settings = mailoutbox = [] def test_remove_secondary(auth_client, user, settings, mailoutbox): settings.ACCOUNT_EMAIL_NOTIFICATIONS = True secondary = EmailAddress.objects.create( email="secondary@email.org", user=user, verified=False, primary=False ) resp = auth_client.post( > reverse("account_email"), {"action_remove": "", "email": secondary.email}, ) allauth/account/tests/test_change_email.py:79: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_set_primary_unverified __________________________ auth_client = user = def test_set_primary_unverified(auth_client, user): secondary = EmailAddress.objects.create( email="secondary@email.org", user=user, verified=False, primary=False ) resp = auth_client.post( > reverse("account_email"), {"action_primary": "", "email": secondary.email}, ) allauth/account/tests/test_change_email.py:94: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________________ test_set_primary _______________________________ auth_client = user = def test_set_primary(auth_client, user): primary = EmailAddress.objects.get(email=user.email) secondary = EmailAddress.objects.create( email="secondary@email.org", user=user, verified=True, primary=False ) resp = auth_client.post( > reverse("account_email"), {"action_primary": "", "email": secondary.email}, ) allauth/account/tests/test_change_email.py:110: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________________ test_verify __________________________________ auth_client = user = def test_verify(auth_client, user): secondary = EmailAddress.objects.create( email="secondary@email.org", user=user, verified=False, primary=False ) resp = auth_client.post( > reverse("account_email"), {"action_send": "", "email": secondary.email}, ) allauth/account/tests/test_change_email.py:125: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_verify_unknown_email ___________________________ auth_client = user = def test_verify_unknown_email(auth_client, user): auth_client.post( > reverse("account_email"), {"action_send": "", "email": "email@unknown.org"}, ) allauth/account/tests/test_change_email.py:133: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_add_with_two_limiter ___________________________ auth_client = user = settings = def test_add_with_two_limiter(auth_client, user, settings): EmailAddress.objects.create( email="secondary@email.org", user=user, verified=False, primary=False ) settings.ACCOUNT_MAX_EMAIL_ADDRESSES = 2 resp = auth_client.post( > reverse("account_email"), {"action_add": "", "email": "john3@example.org"} ) allauth/account/tests/test_change_email.py:146: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_add_with_none_limiter __________________________ auth_client = settings = def test_add_with_none_limiter(auth_client, settings): settings.ACCOUNT_MAX_EMAIL_ADDRESSES = None resp = auth_client.post( > reverse("account_email"), {"action_add": "", "email": "john3@example.org"} ) allauth/account/tests/test_change_email.py:154: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_add_with_zero_limiter __________________________ auth_client = settings = def test_add_with_zero_limiter(auth_client, settings): settings.ACCOUNT_MAX_EMAIL_ADDRESSES = 0 resp = auth_client.post( > reverse("account_email"), {"action_add": "", "email": "john3@example.org"} ) allauth/account/tests/test_change_email.py:162: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_delete_email_changes_user_email _____________________ user_factory = .factory at 0x7f2984faf690> client = email_factory = .factory at 0x7f2984fac300> def test_delete_email_changes_user_email(user_factory, client, email_factory): user = user_factory(email_verified=False) client.force_login(user) first_email = EmailAddress.objects.get(user=user) first_email.primary = False first_email.save() # other_unverified_email EmailAddress.objects.create( user=user, email=email_factory(), verified=False, primary=False ) other_verified_email = EmailAddress.objects.create( user=user, email=email_factory(), verified=True, primary=False ) assert user_email(user) == first_email.email resp = client.post( > reverse("account_email"), {"action_remove": "", "email": first_email.email}, ) allauth/account/tests/test_change_email.py:206: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_delete_email_wipes_user_email ______________________ user_factory = .factory at 0x7f2984fac0f0> client = def test_delete_email_wipes_user_email(user_factory, client): user = user_factory(email_verified=False) client.force_login(user) first_email = EmailAddress.objects.get(user=user) first_email.primary = False first_email.save() assert user_email(user) == first_email.email resp = client.post( > reverse("account_email"), {"action_remove": "", "email": first_email.email}, ) allauth/account/tests/test_change_email.py:222: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________________ test_change_email _______________________________ user_factory = .factory at 0x7f298515f8a0> client = settings = mailoutbox = [] def test_change_email(user_factory, client, settings, mailoutbox): settings.ACCOUNT_CHANGE_EMAIL = True settings.ACCOUNT_EMAIL_CONFIRMATION_HMAC = True settings.ACCOUNT_EMAIL_NOTIFICATIONS = True user = user_factory(email_verified=True) client.force_login(user) current_email = EmailAddress.objects.get(user=user) resp = client.post( > reverse("account_email"), {"action_add": "", "email": "change-to@this.org"}, ) allauth/account/tests/test_change_email.py:239: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________________ test_add ___________________________________ auth_client = user = settings = def test_add(auth_client, user, settings): resp = auth_client.post( > reverse("account_email"), {"action_add": "", "email": "john3@example.org"}, ) allauth/account/tests/test_change_email.py:263: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_add_with_reauthentication ________________________ auth_client = user = user_password = 'c7813624-f47d-4cb7-9db4-8bdfd6db3c49' settings = def test_add_with_reauthentication(auth_client, user, user_password, settings): settings.ACCOUNT_REAUTHENTICATION_REQUIRED = True resp = auth_client.post( > reverse("account_email"), {"action_add": "", "email": "john3@example.org"}, ) allauth/account/tests/test_change_email.py:278: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_add_not_allowed[False] __________________________ auth_client = user = settings = user_factory = .factory at 0x7f298523b7f0> prevent_enumeration = False @pytest.mark.parametrize( "prevent_enumeration", [ False, True, "strict", ], ) def test_add_not_allowed( auth_client, user, settings, user_factory, prevent_enumeration ): settings.ACCOUNT_PREVENT_ENUMERATION = prevent_enumeration email = "inuse@byotheruser.com" user_factory(email=email) resp = auth_client.post( > reverse("account_email"), {"action_add": "", "email": email}, ) allauth/account/tests/test_change_email.py:309: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_add_not_allowed[True] __________________________ auth_client = user = settings = user_factory = .factory at 0x7f29852392d0> prevent_enumeration = True @pytest.mark.parametrize( "prevent_enumeration", [ False, True, "strict", ], ) def test_add_not_allowed( auth_client, user, settings, user_factory, prevent_enumeration ): settings.ACCOUNT_PREVENT_ENUMERATION = prevent_enumeration email = "inuse@byotheruser.com" user_factory(email=email) resp = auth_client.post( > reverse("account_email"), {"action_add": "", "email": email}, ) allauth/account/tests/test_change_email.py:309: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_add_not_allowed[strict] _________________________ auth_client = user = settings = user_factory = .factory at 0x7f29852380f0> prevent_enumeration = 'strict' @pytest.mark.parametrize( "prevent_enumeration", [ False, True, "strict", ], ) def test_add_not_allowed( auth_client, user, settings, user_factory, prevent_enumeration ): settings.ACCOUNT_PREVENT_ENUMERATION = prevent_enumeration email = "inuse@byotheruser.com" user_factory(email=email) resp = auth_client.post( > reverse("account_email"), {"action_add": "", "email": email}, ) allauth/account/tests/test_change_email.py:309: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____ test_remove_email[email-pri@ma.il-secondary_emails0-pri@ma.il-False] _____ client = settings = user_factory = .factory at 0x7f29851f7690> primary_email = 'pri@ma.il', secondary_emails = ['sec@ma.il'] delete_email = 'pri@ma.il' authentication_method = , success = False @pytest.mark.parametrize( "authentication_method,primary_email,secondary_emails,delete_email,success", [ (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.EMAIL, "pri@ma.il", [], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.USERNAME, "pri@ma.il", [], "pri@ma.il", True), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False, ), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True, ), (AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", [], "pri@ma.il", True), ], ) def test_remove_email( client, settings, user_factory, primary_email, secondary_emails, delete_email, authentication_method, success, ): settings.ACCOUNT_AUTHENTICATION_METHOD = authentication_method user = user_factory(email=primary_email) EmailAddress.objects.bulk_create( [ EmailAddress(user=user, email=email, primary=False, verified=False) for email in secondary_emails ] ) client.force_login(user) resp = client.post( > reverse("account_email"), {"action_remove": "", "email": delete_email}, ) allauth/account/tests/test_change_email.py:380: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____ test_remove_email[email-pri@ma.il-secondary_emails1-sec@ma.il-True] ______ client = settings = user_factory = .factory at 0x7f29851f4a90> primary_email = 'pri@ma.il', secondary_emails = ['sec@ma.il'] delete_email = 'sec@ma.il' authentication_method = , success = True @pytest.mark.parametrize( "authentication_method,primary_email,secondary_emails,delete_email,success", [ (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.EMAIL, "pri@ma.il", [], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.USERNAME, "pri@ma.il", [], "pri@ma.il", True), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False, ), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True, ), (AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", [], "pri@ma.il", True), ], ) def test_remove_email( client, settings, user_factory, primary_email, secondary_emails, delete_email, authentication_method, success, ): settings.ACCOUNT_AUTHENTICATION_METHOD = authentication_method user = user_factory(email=primary_email) EmailAddress.objects.bulk_create( [ EmailAddress(user=user, email=email, primary=False, verified=False) for email in secondary_emails ] ) client.force_login(user) resp = client.post( > reverse("account_email"), {"action_remove": "", "email": delete_email}, ) allauth/account/tests/test_change_email.py:380: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____ test_remove_email[email-pri@ma.il-secondary_emails2-pri@ma.il-False] _____ client = settings = user_factory = .factory at 0x7f2985176f00> primary_email = 'pri@ma.il', secondary_emails = [], delete_email = 'pri@ma.il' authentication_method = , success = False @pytest.mark.parametrize( "authentication_method,primary_email,secondary_emails,delete_email,success", [ (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.EMAIL, "pri@ma.il", [], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.USERNAME, "pri@ma.il", [], "pri@ma.il", True), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False, ), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True, ), (AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", [], "pri@ma.il", True), ], ) def test_remove_email( client, settings, user_factory, primary_email, secondary_emails, delete_email, authentication_method, success, ): settings.ACCOUNT_AUTHENTICATION_METHOD = authentication_method user = user_factory(email=primary_email) EmailAddress.objects.bulk_create( [ EmailAddress(user=user, email=email, primary=False, verified=False) for email in secondary_emails ] ) client.force_login(user) resp = client.post( > reverse("account_email"), {"action_remove": "", "email": delete_email}, ) allauth/account/tests/test_change_email.py:380: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___ test_remove_email[username-pri@ma.il-secondary_emails3-pri@ma.il-False] ____ client = settings = user_factory = .factory at 0x7f29861ee6c0> primary_email = 'pri@ma.il', secondary_emails = ['sec@ma.il'] delete_email = 'pri@ma.il' authentication_method = success = False @pytest.mark.parametrize( "authentication_method,primary_email,secondary_emails,delete_email,success", [ (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.EMAIL, "pri@ma.il", [], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.USERNAME, "pri@ma.il", [], "pri@ma.il", True), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False, ), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True, ), (AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", [], "pri@ma.il", True), ], ) def test_remove_email( client, settings, user_factory, primary_email, secondary_emails, delete_email, authentication_method, success, ): settings.ACCOUNT_AUTHENTICATION_METHOD = authentication_method user = user_factory(email=primary_email) EmailAddress.objects.bulk_create( [ EmailAddress(user=user, email=email, primary=False, verified=False) for email in secondary_emails ] ) client.force_login(user) resp = client.post( > reverse("account_email"), {"action_remove": "", "email": delete_email}, ) allauth/account/tests/test_change_email.py:380: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____ test_remove_email[username-pri@ma.il-secondary_emails4-sec@ma.il-True] ____ client = settings = user_factory = .factory at 0x7f29858cac40> primary_email = 'pri@ma.il', secondary_emails = ['sec@ma.il'] delete_email = 'sec@ma.il' authentication_method = success = True @pytest.mark.parametrize( "authentication_method,primary_email,secondary_emails,delete_email,success", [ (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.EMAIL, "pri@ma.il", [], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.USERNAME, "pri@ma.il", [], "pri@ma.il", True), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False, ), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True, ), (AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", [], "pri@ma.il", True), ], ) def test_remove_email( client, settings, user_factory, primary_email, secondary_emails, delete_email, authentication_method, success, ): settings.ACCOUNT_AUTHENTICATION_METHOD = authentication_method user = user_factory(email=primary_email) EmailAddress.objects.bulk_create( [ EmailAddress(user=user, email=email, primary=False, verified=False) for email in secondary_emails ] ) client.force_login(user) resp = client.post( > reverse("account_email"), {"action_remove": "", "email": delete_email}, ) allauth/account/tests/test_change_email.py:380: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____ test_remove_email[username-pri@ma.il-secondary_emails5-pri@ma.il-True] ____ client = settings = user_factory = .factory at 0x7f2985902b90> primary_email = 'pri@ma.il', secondary_emails = [], delete_email = 'pri@ma.il' authentication_method = success = True @pytest.mark.parametrize( "authentication_method,primary_email,secondary_emails,delete_email,success", [ (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.EMAIL, "pri@ma.il", [], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.USERNAME, "pri@ma.il", [], "pri@ma.il", True), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False, ), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True, ), (AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", [], "pri@ma.il", True), ], ) def test_remove_email( client, settings, user_factory, primary_email, secondary_emails, delete_email, authentication_method, success, ): settings.ACCOUNT_AUTHENTICATION_METHOD = authentication_method user = user_factory(email=primary_email) EmailAddress.objects.bulk_create( [ EmailAddress(user=user, email=email, primary=False, verified=False) for email in secondary_emails ] ) client.force_login(user) resp = client.post( > reverse("account_email"), {"action_remove": "", "email": delete_email}, ) allauth/account/tests/test_change_email.py:380: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _ test_remove_email[username_email-pri@ma.il-secondary_emails6-pri@ma.il-False] _ client = settings = user_factory = .factory at 0x7f298631eda0> primary_email = 'pri@ma.il', secondary_emails = ['sec@ma.il'] delete_email = 'pri@ma.il' authentication_method = success = False @pytest.mark.parametrize( "authentication_method,primary_email,secondary_emails,delete_email,success", [ (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.EMAIL, "pri@ma.il", [], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.USERNAME, "pri@ma.il", [], "pri@ma.il", True), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False, ), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True, ), (AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", [], "pri@ma.il", True), ], ) def test_remove_email( client, settings, user_factory, primary_email, secondary_emails, delete_email, authentication_method, success, ): settings.ACCOUNT_AUTHENTICATION_METHOD = authentication_method user = user_factory(email=primary_email) EmailAddress.objects.bulk_create( [ EmailAddress(user=user, email=email, primary=False, verified=False) for email in secondary_emails ] ) client.force_login(user) resp = client.post( > reverse("account_email"), {"action_remove": "", "email": delete_email}, ) allauth/account/tests/test_change_email.py:380: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _ test_remove_email[username_email-pri@ma.il-secondary_emails7-sec@ma.il-True] _ client = settings = user_factory = .factory at 0x7f2986241b10> primary_email = 'pri@ma.il', secondary_emails = ['sec@ma.il'] delete_email = 'sec@ma.il' authentication_method = success = True @pytest.mark.parametrize( "authentication_method,primary_email,secondary_emails,delete_email,success", [ (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.EMAIL, "pri@ma.il", [], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.USERNAME, "pri@ma.il", [], "pri@ma.il", True), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False, ), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True, ), (AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", [], "pri@ma.il", True), ], ) def test_remove_email( client, settings, user_factory, primary_email, secondary_emails, delete_email, authentication_method, success, ): settings.ACCOUNT_AUTHENTICATION_METHOD = authentication_method user = user_factory(email=primary_email) EmailAddress.objects.bulk_create( [ EmailAddress(user=user, email=email, primary=False, verified=False) for email in secondary_emails ] ) client.force_login(user) resp = client.post( > reverse("account_email"), {"action_remove": "", "email": delete_email}, ) allauth/account/tests/test_change_email.py:380: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _ test_remove_email[username_email-pri@ma.il-secondary_emails8-pri@ma.il-True] _ client = settings = user_factory = .factory at 0x7f2984ebdbc0> primary_email = 'pri@ma.il', secondary_emails = [], delete_email = 'pri@ma.il' authentication_method = success = True @pytest.mark.parametrize( "authentication_method,primary_email,secondary_emails,delete_email,success", [ (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.EMAIL, "pri@ma.il", [], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False), (AuthenticationMethod.USERNAME, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True), (AuthenticationMethod.USERNAME, "pri@ma.il", [], "pri@ma.il", True), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "pri@ma.il", False, ), ( AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", ["sec@ma.il"], "sec@ma.il", True, ), (AuthenticationMethod.USERNAME_EMAIL, "pri@ma.il", [], "pri@ma.il", True), ], ) def test_remove_email( client, settings, user_factory, primary_email, secondary_emails, delete_email, authentication_method, success, ): settings.ACCOUNT_AUTHENTICATION_METHOD = authentication_method user = user_factory(email=primary_email) EmailAddress.objects.bulk_create( [ EmailAddress(user=user, email=email, primary=False, verified=False) for email in secondary_emails ] ) client.force_login(user) resp = client.post( > reverse("account_email"), {"action_remove": "", "email": delete_email}, ) allauth/account/tests/test_change_email.py:380: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ test_dont_lookup_invalid_email[valid@email.org-True] _____________ auth_client = email = 'valid@email.org', did_look_up = True @pytest.mark.parametrize( "email,did_look_up", [ ("valid@email.org", True), ("not-an-email", False), ], ) def test_dont_lookup_invalid_email(auth_client, email, did_look_up): with patch("allauth.account.views.EmailAddress.objects.get_for_user") as gfu_mock: gfu_mock.side_effect = EmailAddress.DoesNotExist auth_client.post( > reverse("account_email"), {"action_remove": "", "email": email}, ) allauth/account/tests/test_change_email.py:399: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ test_dont_lookup_invalid_email[not-an-email-False] ______________ auth_client = email = 'not-an-email', did_look_up = False @pytest.mark.parametrize( "email,did_look_up", [ ("valid@email.org", True), ("not-an-email", False), ], ) def test_dont_lookup_invalid_email(auth_client, email, did_look_up): with patch("allauth.account.views.EmailAddress.objects.get_for_user") as gfu_mock: gfu_mock.side_effect = EmailAddress.DoesNotExist auth_client.post( > reverse("account_email"), {"action_remove": "", "email": email}, ) allauth/account/tests/test_change_email.py:399: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_add_requires_reauthentication ______________________ settings = auth_client = def test_add_requires_reauthentication(settings, auth_client): settings.ACCOUNT_REAUTHENTICATION_REQUIRED = True resp = auth_client.post( > reverse("account_email"), {"action_add": "", "email": "john3@example.org"}, ) allauth/account/tests/test_change_email.py:408: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_remove_requires_reauthentication _____________________ auth_client = user = settings = def test_remove_requires_reauthentication(auth_client, user, settings): settings.ACCOUNT_REAUTHENTICATION_REQUIRED = True secondary = EmailAddress.objects.create( email="secondary@email.org", user=user, verified=False, primary=False ) resp = auth_client.post( > reverse("account_email"), {"action_remove": "", "email": secondary.email}, ) allauth/account/tests/test_change_email.py:421: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ test_set_primary_requires_reauthentication __________________ auth_client = user = settings = def test_set_primary_requires_reauthentication(auth_client, user, settings): settings.ACCOUNT_REAUTHENTICATION_REQUIRED = True primary = EmailAddress.objects.get(email=user.email) secondary = EmailAddress.objects.create( email="secondary@email.org", user=user, verified=True, primary=False ) resp = auth_client.post( > reverse("account_email"), {"action_primary": "", "email": secondary.email}, ) allauth/account/tests/test_change_email.py:435: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_change_unusable_password_redirects_to_set ________________ client = user = user_password = '7a4bd89d-48db-4a2b-9ba4-9e89d3a1c7e6' def test_change_unusable_password_redirects_to_set(client, user, user_password): user.set_unusable_password() user.save() client.force_login(user) > resp = client.get(reverse("account_change_password")) allauth/account/tests/test_change_password.py:10: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_set_usable_password_redirects_to_change _________________ auth_client = user = def test_set_usable_password_redirects_to_change(auth_client, user): > resp = auth_client.get(reverse("account_set_password")) allauth/account/tests/test_change_password.py:16: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ test_set_password[False--redirect_chain0] ___________________ client = user = , next_url = '' password_factory = .f at 0x7f298541bc10> logout = False settings = redirect_chain = [(<[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] __proxy__ object at 0x7f29869e2ba0>, 302)] @pytest.mark.parametrize( "logout,next_url,redirect_chain", [ (False, "", [(reverse_lazy("account_change_password"), 302)]), (False, "/foo", [("/foo", 302)]), ( True, "", [ (reverse_lazy("account_change_password"), 302), ( "/accounts/login/?next=/accounts/password/change/", 302, ), ], ), (True, "/foo", [("/foo", 302)]), ], ) def test_set_password( client, user, next_url, password_factory, logout, settings, redirect_chain ): settings.ACCOUNT_LOGOUT_ON_PASSWORD_CHANGE = logout user.set_unusable_password() user.save() client.force_login(user) password = password_factory() data = {"password1": password, "password2": password} if next_url: data["next"] = next_url resp = client.post( > reverse("account_set_password"), data, follow=True, ) allauth/account/tests/test_change_password.py:52: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_set_password[False-/foo-redirect_chain1] _________________ client = user = , next_url = '/foo' password_factory = .f at 0x7f29853a8a90> logout = False settings = redirect_chain = [('/foo', 302)] @pytest.mark.parametrize( "logout,next_url,redirect_chain", [ (False, "", [(reverse_lazy("account_change_password"), 302)]), (False, "/foo", [("/foo", 302)]), ( True, "", [ (reverse_lazy("account_change_password"), 302), ( "/accounts/login/?next=/accounts/password/change/", 302, ), ], ), (True, "/foo", [("/foo", 302)]), ], ) def test_set_password( client, user, next_url, password_factory, logout, settings, redirect_chain ): settings.ACCOUNT_LOGOUT_ON_PASSWORD_CHANGE = logout user.set_unusable_password() user.save() client.force_login(user) password = password_factory() data = {"password1": password, "password2": password} if next_url: data["next"] = next_url resp = client.post( > reverse("account_set_password"), data, follow=True, ) allauth/account/tests/test_change_password.py:52: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_set_password[True--redirect_chain2] ___________________ client = user = , next_url = '' password_factory = .f at 0x7f29850a5b10> logout = True settings = redirect_chain = [(<[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] __proxy__ object at 0x7f2986a260d0>, 302), ('/accounts/login/?next=/accounts/password/change/', 302)] @pytest.mark.parametrize( "logout,next_url,redirect_chain", [ (False, "", [(reverse_lazy("account_change_password"), 302)]), (False, "/foo", [("/foo", 302)]), ( True, "", [ (reverse_lazy("account_change_password"), 302), ( "/accounts/login/?next=/accounts/password/change/", 302, ), ], ), (True, "/foo", [("/foo", 302)]), ], ) def test_set_password( client, user, next_url, password_factory, logout, settings, redirect_chain ): settings.ACCOUNT_LOGOUT_ON_PASSWORD_CHANGE = logout user.set_unusable_password() user.save() client.force_login(user) password = password_factory() data = {"password1": password, "password2": password} if next_url: data["next"] = next_url resp = client.post( > reverse("account_set_password"), data, follow=True, ) allauth/account/tests/test_change_password.py:52: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_set_password[True-/foo-redirect_chain3] _________________ client = user = , next_url = '/foo' password_factory = .f at 0x7f29850a5010> logout = True settings = redirect_chain = [('/foo', 302)] @pytest.mark.parametrize( "logout,next_url,redirect_chain", [ (False, "", [(reverse_lazy("account_change_password"), 302)]), (False, "/foo", [("/foo", 302)]), ( True, "", [ (reverse_lazy("account_change_password"), 302), ( "/accounts/login/?next=/accounts/password/change/", 302, ), ], ), (True, "/foo", [("/foo", 302)]), ], ) def test_set_password( client, user, next_url, password_factory, logout, settings, redirect_chain ): settings.ACCOUNT_LOGOUT_ON_PASSWORD_CHANGE = logout user.set_unusable_password() user.save() client.force_login(user) password = password_factory() data = {"password1": password, "password2": password} if next_url: data["next"] = next_url resp = client.post( > reverse("account_set_password"), data, follow=True, ) allauth/account/tests/test_change_password.py:52: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_change_password[False--redirect_chain0] _________________ auth_client = user = user_password = '211d32e6-c0ec-4c31-8828-763b343bc5c4', next_url = '' password_factory = .f at 0x7f2985175f30> logout = False settings = redirect_chain = [(<[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] __proxy__ object at 0x7f2986a25590>, 302)] mailoutbox = [] @pytest.mark.parametrize( "logout,next_url,redirect_chain", [ (False, "", [(reverse_lazy("account_change_password"), 302)]), (False, "/foo", [("/foo", 302)]), ( True, "", [ (reverse_lazy("account_change_password"), 302), ( "/accounts/login/?next=/accounts/password/change/", 302, ), ], ), (True, "/foo", [("/foo", 302)]), ], ) def test_change_password( auth_client, user, user_password, next_url, password_factory, logout, settings, redirect_chain, mailoutbox, ): settings.ACCOUNT_LOGOUT_ON_PASSWORD_CHANGE = logout settings.ACCOUNT_EMAIL_NOTIFICATIONS = True password = password_factory() data = {"oldpassword": user_password, "password1": password, "password2": password} if next_url: data["next"] = next_url resp = auth_client.post( > reverse("account_change_password"), data, follow=True, ) allauth/account/tests/test_change_password.py:96: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_change_password[False-/foo-redirect_chain1] _______________ auth_client = user = user_password = 'a9f0102e-0cd4-437b-ac46-9a4904a17614', next_url = '/foo' password_factory = .f at 0x7f2985176fb0> logout = False settings = redirect_chain = [('/foo', 302)], mailoutbox = [] @pytest.mark.parametrize( "logout,next_url,redirect_chain", [ (False, "", [(reverse_lazy("account_change_password"), 302)]), (False, "/foo", [("/foo", 302)]), ( True, "", [ (reverse_lazy("account_change_password"), 302), ( "/accounts/login/?next=/accounts/password/change/", 302, ), ], ), (True, "/foo", [("/foo", 302)]), ], ) def test_change_password( auth_client, user, user_password, next_url, password_factory, logout, settings, redirect_chain, mailoutbox, ): settings.ACCOUNT_LOGOUT_ON_PASSWORD_CHANGE = logout settings.ACCOUNT_EMAIL_NOTIFICATIONS = True password = password_factory() data = {"oldpassword": user_password, "password1": password, "password2": password} if next_url: data["next"] = next_url resp = auth_client.post( > reverse("account_change_password"), data, follow=True, ) allauth/account/tests/test_change_password.py:96: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_change_password[True--redirect_chain2] __________________ auth_client = user = user_password = '74516ed2-8bbc-4f8a-9539-fe06ae3d519f', next_url = '' password_factory = .f at 0x7f2985174880> logout = True settings = redirect_chain = [(<[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] __proxy__ object at 0x7f2986a2da70>, 302), ('/accounts/login/?next=/accounts/password/change/', 302)] mailoutbox = [] @pytest.mark.parametrize( "logout,next_url,redirect_chain", [ (False, "", [(reverse_lazy("account_change_password"), 302)]), (False, "/foo", [("/foo", 302)]), ( True, "", [ (reverse_lazy("account_change_password"), 302), ( "/accounts/login/?next=/accounts/password/change/", 302, ), ], ), (True, "/foo", [("/foo", 302)]), ], ) def test_change_password( auth_client, user, user_password, next_url, password_factory, logout, settings, redirect_chain, mailoutbox, ): settings.ACCOUNT_LOGOUT_ON_PASSWORD_CHANGE = logout settings.ACCOUNT_EMAIL_NOTIFICATIONS = True password = password_factory() data = {"oldpassword": user_password, "password1": password, "password2": password} if next_url: data["next"] = next_url resp = auth_client.post( > reverse("account_change_password"), data, follow=True, ) allauth/account/tests/test_change_password.py:96: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_change_password[True-/foo-redirect_chain3] ________________ auth_client = user = user_password = 'ee35980e-b7bf-4ae3-90fc-3b66d483791f', next_url = '/foo' password_factory = .f at 0x7f2985174d50> logout = True settings = redirect_chain = [('/foo', 302)], mailoutbox = [] @pytest.mark.parametrize( "logout,next_url,redirect_chain", [ (False, "", [(reverse_lazy("account_change_password"), 302)]), (False, "/foo", [("/foo", 302)]), ( True, "", [ (reverse_lazy("account_change_password"), 302), ( "/accounts/login/?next=/accounts/password/change/", 302, ), ], ), (True, "/foo", [("/foo", 302)]), ], ) def test_change_password( auth_client, user, user_password, next_url, password_factory, logout, settings, redirect_chain, mailoutbox, ): settings.ACCOUNT_LOGOUT_ON_PASSWORD_CHANGE = logout settings.ACCOUNT_EMAIL_NOTIFICATIONS = True password = password_factory() data = {"oldpassword": user_password, "password1": password, "password2": password} if next_url: data["next"] = next_url resp = auth_client.post( > reverse("account_change_password"), data, follow=True, ) allauth/account/tests/test_change_password.py:96: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_verified_email_required _________________________ user_factory = .factory at 0x7f29851f49e0> request_factory = .RequestFactory object at 0x7f2985247a10> def test_verified_email_required(user_factory, request_factory): user = user_factory(email_verified=False) @verified_email_required def view(request): raise AssertionError() request = request_factory.get("/") request.user = user > view(request) allauth/account/tests/test_decorators.py:17: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/contrib/auth/decorators.py:59: in _view_wrapper return view_func(request, *args, **kwargs) allauth/account/decorators.py:41: in _wrapped_view send_email_confirmation(request, request.user) allauth/account/utils.py:284: in send_email_confirmation return flows.email_verification.send_verification_email( allauth/account/internal/flows/email_verification.py:208: in send_verification_email email_address.send_confirmation(request, signup=signup) allauth/account/models.py:107: in send_confirmation confirmation.send(request, signup=signup) allauth/account/models.py:135: in send get_adapter().send_confirmation_mail(request, self, signup) allauth/account/adapter.py:628: in send_confirmation_mail "activate_url": self.get_email_confirmation_url( allauth/account/adapter.py:597: in get_email_confirmation_url return flows.email_verification.get_email_verification_url( allauth/account/internal/flows/email_verification.py:94: in get_email_verification_url url = reverse("account_confirm_email", args=[emailconfirmation.key]) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_secure_admin_login_denies_regular_users _________________ auth_client = def test_secure_admin_login_denies_regular_users(auth_client): > resp = auth_client.get(reverse("admin:login")) allauth/account/tests/test_decorators.py:30: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_secure_admin_login_passes_staff _____________________ auth_client = user = def test_secure_admin_login_passes_staff(auth_client, user): user.is_staff = True user.is_superuser = True user.save(update_fields=["is_staff", "is_superuser"]) > resp = auth_client.get(reverse("admin:auth_user_changelist")) allauth/account/tests/test_decorators.py:38: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ test_login_on_verification[None--/accounts/profile/] _____________ adapter = None, client = db = None, query = '', expected_location = '/accounts/profile/' password_factory = .f at 0x7f2985239f30> settings = @pytest.mark.parametrize( "adapter,query,expected_location", [ (None, "", app_settings.SIGNUP_REDIRECT_URL), (None, "?next=/foo", "/foo"), ( "allauth.account.tests.test_email_verification.TestEmailVerificationAdapter", "", TestEmailVerificationAdapter.SIGNUP_REDIRECT_URL, ), ], ) def test_login_on_verification( adapter, client, db, query, expected_location, password_factory, settings ): settings.ACCOUNT_EMAIL_VERIFICATION = app_settings.EmailVerificationMethod.MANDATORY settings.ACCOUNT_EMAIL_CONFIRMATION_HMAC = True settings.ACCOUNT_LOGIN_ON_EMAIL_CONFIRMATION = True if adapter: settings.ACCOUNT_ADAPTER = adapter password = password_factory() resp = client.post( > reverse("account_signup"), data={ "username": "john", "email": "a@a.com", "password1": password, "password2": password, }, ) allauth/account/tests/test_email_verification.py:55: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_login_on_verification[None-?next=/foo-/foo] _______________ adapter = None, client = db = None, query = '?next=/foo', expected_location = '/foo' password_factory = .f at 0x7f2984fad7a0> settings = @pytest.mark.parametrize( "adapter,query,expected_location", [ (None, "", app_settings.SIGNUP_REDIRECT_URL), (None, "?next=/foo", "/foo"), ( "allauth.account.tests.test_email_verification.TestEmailVerificationAdapter", "", TestEmailVerificationAdapter.SIGNUP_REDIRECT_URL, ), ], ) def test_login_on_verification( adapter, client, db, query, expected_location, password_factory, settings ): settings.ACCOUNT_EMAIL_VERIFICATION = app_settings.EmailVerificationMethod.MANDATORY settings.ACCOUNT_EMAIL_CONFIRMATION_HMAC = True settings.ACCOUNT_LOGIN_ON_EMAIL_CONFIRMATION = True if adapter: settings.ACCOUNT_ADAPTER = adapter password = password_factory() resp = client.post( > reverse("account_signup"), data={ "username": "john", "email": "a@a.com", "password1": password, "password2": password, }, ) allauth/account/tests/test_email_verification.py:55: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _ test_login_on_verification[allauth.account.tests.test_email_verification.TestEmailVerificationAdapter--/foobar] _ adapter = 'allauth.account.tests.test_email_verification.TestEmailVerificationAdapter' client = , db = None query = '', expected_location = '/foobar' password_factory = .f at 0x7f29853214e0> settings = @pytest.mark.parametrize( "adapter,query,expected_location", [ (None, "", app_settings.SIGNUP_REDIRECT_URL), (None, "?next=/foo", "/foo"), ( "allauth.account.tests.test_email_verification.TestEmailVerificationAdapter", "", TestEmailVerificationAdapter.SIGNUP_REDIRECT_URL, ), ], ) def test_login_on_verification( adapter, client, db, query, expected_location, password_factory, settings ): settings.ACCOUNT_EMAIL_VERIFICATION = app_settings.EmailVerificationMethod.MANDATORY settings.ACCOUNT_EMAIL_CONFIRMATION_HMAC = True settings.ACCOUNT_LOGIN_ON_EMAIL_CONFIRMATION = True if adapter: settings.ACCOUNT_ADAPTER = adapter password = password_factory() resp = client.post( > reverse("account_signup"), data={ "username": "john", "email": "a@a.com", "password1": password, "password2": password, }, ) allauth/account/tests/test_email_verification.py:55: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_email_verification_failed ________________________ settings = user_factory = .factory at 0x7f2984ebd430> client = def test_email_verification_failed(settings, user_factory, client): settings.ACCOUNT_EMAIL_CONFIRMATION_HMAC = False user_factory(email_verified=True, email="foo@bar.org") unverified_user = user_factory(email_verified=False, email="foo@bar.org") email_address = EmailAddress.objects.get_for_user( unverified_user, unverified_user.email ) assert not email_address.verified confirmation = EmailConfirmation.objects.create( email_address=email_address, key="dummy", sent=now(), ) > resp = client.post(reverse("account_confirm_email", args=[confirmation.key])) allauth/account/tests/test_email_verification.py:104: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_email_verification_mandatory _______________________ settings = db = None, client = mailoutbox = [], enable_cache = None def test_email_verification_mandatory(settings, db, client, mailoutbox, enable_cache): settings.ACCOUNT_EMAIL_CONFIRMATION_HMAC = False settings.ACCOUNT_EMAIL_CONFIRMATION_COOLDOWN = 10 settings.ACCOUNT_EMAIL_VERIFICATION = app_settings.EmailVerificationMethod.MANDATORY # Signup resp = client.post( > reverse("account_signup"), { "username": "johndoe", "email": "john@example.com", "password1": "johndoe", "password2": "johndoe", }, follow=True, ) allauth/account/tests/test_email_verification.py:114: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_optional_email_verification _______________________ settings = client = , db = None mailoutbox = [] def test_optional_email_verification(settings, client, db, mailoutbox): settings.ACCOUNT_SIGNUP_REDIRECT_URL = "/accounts/welcome/" settings.ACCOUNT_EMAIL_VERIFICATION = app_settings.EmailVerificationMethod.OPTIONAL settings.ACCOUNT_SIGNUP_PASSWORD_ENTER_TWICE = False # Signup > client.get(reverse("account_signup")) allauth/account/tests/test_email_verification.py:184: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_email_verification_hmac _________________________ settings = client = user_factory = .factory at 0x7f2984ebc0f0> mailoutbox = [] rf = def test_email_verification_hmac(settings, client, user_factory, mailoutbox, rf): settings.ACCOUNT_EMAIL_CONFIRMATION_HMAC = True user = user_factory(email_verified=False) email = EmailAddress.objects.get_for_user(user, user.email) confirmation = EmailConfirmationHMAC(email) request = rf.get("/") > confirmation.send(request=request) allauth/account/tests/test_email_verification.py:222: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/models.py:135: in send get_adapter().send_confirmation_mail(request, self, signup) allauth/account/adapter.py:628: in send_confirmation_mail "activate_url": self.get_email_confirmation_url( allauth/account/adapter.py:597: in get_email_confirmation_url return flows.email_verification.get_email_verification_url( allauth/account/internal/flows/email_verification.py:94: in get_email_verification_url url = reverse("account_confirm_email", args=[emailconfirmation.key]) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_email_verification_hmac_timeout _____________________ settings = user_factory = .factory at 0x7f2984ebc300> client = , mailoutbox = [] rf = def test_email_verification_hmac_timeout( settings, user_factory, client, mailoutbox, rf ): settings.ACCOUNT_EMAIL_CONFIRMATION_HMAC = True settings.ACCOUNT_EMAIL_CONFIRMATION_EXPIRE_DAYS = 0 user = user_factory(email_verified=False) email = EmailAddress.objects.get_for_user(user, user.email) confirmation = EmailConfirmationHMAC(email) request = rf.get("/") > confirmation.send(request=request) allauth/account/tests/test_email_verification.py:238: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/models.py:135: in send get_adapter().send_confirmation_mail(request, self, signup) allauth/account/adapter.py:628: in send_confirmation_mail "activate_url": self.get_email_confirmation_url( allauth/account/adapter.py:597: in get_email_confirmation_url return flows.email_verification.get_email_verification_url( allauth/account/internal/flows/email_verification.py:94: in get_email_verification_url url = reverse("account_confirm_email", args=[emailconfirmation.key]) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_verify_email_with_another_user_logged_in _________________ settings = user_factory = .factory at 0x7f2984ebecf0> client = , mailoutbox = [] def test_verify_email_with_another_user_logged_in( settings, user_factory, client, mailoutbox ): """Test the email verification view. If User B clicks on an email verification link while logged in as User A, ensure User A gets logged out.""" settings.ACCOUNT_AUTHENTICATION_METHOD = app_settings.AuthenticationMethod.EMAIL user = user_factory(email_verified=False) client.force_login(user) > client.post(reverse("account_email"), {"email": user.email, "action_send": ""}) allauth/account/tests/test_email_verification.py:254: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ test_verify_email_with_same_user_logged_in __________________ settings = user_factory = .factory at 0x7f2984ebe560> client = , mailoutbox = [] def test_verify_email_with_same_user_logged_in( settings, user_factory, client, mailoutbox ): """If the user clicks on an email verification link while logged in, ensure the user stays logged in. """ settings.ACCOUNT_AUTHENTICATION_METHOD = app_settings.AuthenticationMethod.EMAIL user = user_factory(email_verified=False) client.force_login(user) > client.post(reverse("account_email"), {"email": user.email, "action_send": ""}) allauth/account/tests/test_email_verification.py:289: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_verify_logs_out_user ___________________________ auth_client = settings = user = user_factory = .factory at 0x7f2984e9bd70> def test_verify_logs_out_user(auth_client, settings, user, user_factory): """ When a user is signed in, and you follow an email confirmation link of another user within the same browser/session, be sure to sign out the signed in user. """ settings.ACCOUNT_CONFIRM_EMAIL_ON_GET = False confirming_user = user_factory(email_verified=False) assert auth_client.session[SESSION_KEY] == str(user.pk) email = EmailAddress.objects.get(user=confirming_user, verified=False) auth_client.get( > reverse( "account_confirm_email", kwargs={"key": EmailConfirmationHMAC(email).key} ) ) allauth/account/tests/test_email_verification.py:318: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_email_verification_login_redirect ____________________ client = , db = None settings = password_factory = .f at 0x7f2984e9aae0> def test_email_verification_login_redirect(client, db, settings, password_factory): settings.ACCOUNT_EMAIL_VERIFICATION = app_settings.EmailVerificationMethod.MANDATORY password = password_factory() resp = client.post( > reverse("account_signup"), { "username": "johndoe", "email": "user@email.org", "password1": password, "password2": password, }, ) allauth/account/tests/test_email_verification.py:329: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_email_verification_redirect_url _____________________ client = , db = None settings = user_password = 'c64a923c-9437-4574-8318-24aa24d50517' def test_email_verification_redirect_url(client, db, settings, user_password): settings.ACCOUNT_EMAIL_VERIFICATION = app_settings.EmailVerificationMethod.MANDATORY settings.ACCOUNT_EMAIL_CONFIRMATION_ANONYMOUS_REDIRECT_URL = "/foobar" settings.ACCOUNT_CONFIRM_EMAIL_ON_GET = True email = "user@email.org" resp = client.post( > reverse("account_signup"), { "username": "johndoe", "email": email, "password1": user_password, "password2": user_password, }, ) allauth/account/tests/test_email_verification.py:349: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_signup[-/accounts/profile/] _______________________ client = , db = None settings = password_factory = .f at 0x7f2985321850> get_last_code = .f at 0x7f2985322400> query = '', expected_url = '/accounts/profile/' @pytest.mark.parametrize( "query,expected_url", [ ("", settings.LOGIN_REDIRECT_URL), ("?next=/foo", "/foo"), ], ) def test_signup( client, db, settings, password_factory, get_last_code, query, expected_url ): password = password_factory() resp = client.post( > reverse("account_signup") + query, { "username": "johndoe", "email": "john@example.com", "password1": password, "password2": password, }, ) allauth/account/tests/test_email_verification_by_code.py:52: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_signup[?next=/foo-/foo] _________________________ client = , db = None settings = password_factory = .f at 0x7f2985320040> get_last_code = .f at 0x7f2985320460> query = '?next=/foo', expected_url = '/foo' @pytest.mark.parametrize( "query,expected_url", [ ("", settings.LOGIN_REDIRECT_URL), ("?next=/foo", "/foo"), ], ) def test_signup( client, db, settings, password_factory, get_last_code, query, expected_url ): password = password_factory() resp = client.post( > reverse("account_signup") + query, { "username": "johndoe", "email": "john@example.com", "password1": password, "password2": password, }, ) allauth/account/tests/test_email_verification_by_code.py:52: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_signup_prevent_enumeration ________________________ client = , db = None settings = password_factory = .f at 0x7f29852921f0> user = , mailoutbox = [] def test_signup_prevent_enumeration( client, db, settings, password_factory, user, mailoutbox ): password = password_factory() resp = client.post( > reverse("account_signup"), { "username": "johndoe", "email": user.email, "password1": password, "password2": password, }, ) allauth/account/tests/test_email_verification_by_code.py:76: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_add_or_change_email[False] ________________________ auth_client = user = get_last_code = .f at 0x7f2984e9a8d0> change_email = False settings = @pytest.mark.parametrize("change_email", (False, True)) def test_add_or_change_email(auth_client, user, get_last_code, change_email, settings): settings.ACCOUNT_CHANGE_EMAIL = change_email email = "additional@email.org" assert EmailAddress.objects.filter(user=user).count() == 1 with patch("allauth.account.signals.email_added") as email_added_signal: with patch("allauth.account.signals.email_changed") as email_changed_signal: resp = auth_client.post( > reverse("account_email"), {"action_add": "", "email": email} ) allauth/account/tests/test_email_verification_by_code.py:110: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_add_or_change_email[True] ________________________ auth_client = user = get_last_code = .f at 0x7f2985290d50> change_email = True settings = @pytest.mark.parametrize("change_email", (False, True)) def test_add_or_change_email(auth_client, user, get_last_code, change_email, settings): settings.ACCOUNT_CHANGE_EMAIL = change_email email = "additional@email.org" assert EmailAddress.objects.filter(user=user).count() == 1 with patch("allauth.account.signals.email_added") as email_added_signal: with patch("allauth.account.signals.email_changed") as email_changed_signal: resp = auth_client.post( > reverse("account_email"), {"action_add": "", "email": email} ) allauth/account/tests/test_email_verification_by_code.py:110: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_email_verification_login_redirect ____________________ client = , db = None settings = password_factory = .f at 0x7f2985293320> email_verification_settings = def test_email_verification_login_redirect( client, db, settings, password_factory, email_verification_settings ): password = password_factory() resp = client.post( > reverse("account_signup"), { "username": "johndoe", "email": "user@email.org", "password1": password, "password2": password, }, ) allauth/account/tests/test_email_verification_by_code.py:141: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_email_verification_rate_limits ______________________ db = None, user_password = 'dc3907e0-7992-4b78-8f4c-bb11d5fcb6aa' email_verification_settings = settings = user_factory = .factory at 0x7f29852924b0> password_factory = .f at 0x7f2985291a60> enable_cache = None def test_email_verification_rate_limits( db, user_password, email_verification_settings, settings, user_factory, password_factory, enable_cache, ): settings.ACCOUNT_RATE_LIMITS = {"confirm_email": "1/m/key"} email = "user@email.org" user_factory(email=email, email_verified=False, password=user_password) for attempt in range(2): resp = Client().post( > reverse("account_login"), { "login": email, "password": user_password, }, ) allauth/account/tests/test_email_verification_by_code.py:169: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ LoginTests.test_account_authenticated_login_redirects_is_false ________ self = @override_settings(ACCOUNT_AUTHENTICATED_LOGIN_REDIRECTS=False) def test_account_authenticated_login_redirects_is_false(self): self._create_user_and_login() > resp = self.client.get(reverse("account_login")) allauth/account/tests/test_login.py:309: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ LoginTests.test_ajax_password_change _____________________ self = def test_ajax_password_change(self): self._create_user_and_login() resp = self.client.post( > reverse("account_change_password"), data={ "oldpassword": "doe", "password1": "AbCdEf!123", "password2": "AbCdEf!123456", }, HTTP_X_REQUESTED_WITH="XMLHttpRequest", ) allauth/account/tests/test_login.py:88: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ LoginTests.test_login_failed_attempts_exceeded ________________ self = @override_settings( ACCOUNT_EMAIL_VERIFICATION=app_settings.EmailVerificationMethod.OPTIONAL, ACCOUNT_LOGIN_ATTEMPTS_LIMIT=3, CACHES={ "default": { "BACKEND": "django.core.cache.backends.locmem.LocMemCache", } }, ) def test_login_failed_attempts_exceeded(self): user = get_user_model().objects.create(username="john") user.set_password("doe") user.save() EmailAddress.objects.create( user=user, email="user@example.com", primary=True, verified=False ) for i in range(5): is_valid_attempt = i == 4 is_locked = i >= 3 resp = self.client.post( > reverse("account_login"), { "login": ["john", "John", "JOHN", "JOhn", "joHN"][i], "password": ("doe" if is_valid_attempt else "wrong"), }, ) allauth/account/tests/test_login.py:138: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___ LoginTests.test_login_failed_attempts_exceeded_cleared_on_password_reset ___ self = @override_settings( ACCOUNT_AUTHENTICATION_METHOD=app_settings.AuthenticationMethod.EMAIL, ACCOUNT_EMAIL_VERIFICATION=app_settings.EmailVerificationMethod.MANDATORY, ACCOUNT_LOGIN_ATTEMPTS_LIMIT=1, CACHES={ "default": { "BACKEND": "django.core.cache.backends.locmem.LocMemCache", } }, ) def test_login_failed_attempts_exceeded_cleared_on_password_reset(self): # Ensure that login attempts, once they hit the limit, # can use the password reset mechanism to regain access. user = get_user_model().objects.create( username="john", email="john@example.org", is_active=True ) user.set_password("doe") user.save() EmailAddress.objects.create( user=user, email="john@example.org", primary=True, verified=True ) resp = self.client.post( > reverse("account_login"), {"login": user.email, "password": "bad"} ) allauth/account/tests/test_login.py:178: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ LoginTests.test_login_inactive_account ____________________ self = def test_login_inactive_account(self): """ Tests login behavior with inactive accounts. Inactive user accounts should be prevented from performing any actions, regardless of their verified state. """ # Inactive and verified user account user = get_user_model().objects.create(username="john", is_active=False) user.set_password("doe") user.save() EmailAddress.objects.create( user=user, email="john@example.com", primary=True, verified=True ) resp = self.client.post( > reverse("account_login"), {"login": "john", "password": "doe"} ) allauth/account/tests/test_login.py:290: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ LoginTests.test_login_unverified_account_mandatory ______________ self = def test_login_unverified_account_mandatory(self): """Tests login behavior when email verification is mandatory.""" user = get_user_model().objects.create(username="john") user.set_password("doe") user.save() EmailAddress.objects.create( user=user, email="user@example.com", primary=True, verified=False ) resp = self.client.post( > reverse("account_login"), {"login": "john", "password": "doe"} ) allauth/account/tests/test_login.py:271: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ LoginTests.test_login_unverified_account_optional _______________ self = @override_settings( ACCOUNT_EMAIL_VERIFICATION=app_settings.EmailVerificationMethod.OPTIONAL ) def test_login_unverified_account_optional(self): """Tests login behavior when email verification is optional.""" user = get_user_model().objects.create(username="john") user.set_password("doe") user.save() EmailAddress.objects.create( user=user, email="user@example.com", primary=True, verified=False ) resp = self.client.post( > reverse("account_login"), {"login": "john", "password": "doe"} ) allauth/account/tests/test_login.py:112: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______ LoginTests.test_login_using_unverified_email_address_is_prohibited ______ self = @override_settings( ACCOUNT_AUTHENTICATION_METHOD=app_settings.AuthenticationMethod.EMAIL, ACCOUNT_EMAIL_VERIFICATION=app_settings.EmailVerificationMethod.MANDATORY, ACCOUNT_LOGIN_ATTEMPTS_LIMIT=1, ) def test_login_using_unverified_email_address_is_prohibited(self): user = get_user_model().objects.create( username="john", email="john@example.org", is_active=True ) user.set_password("doe") user.save() EmailAddress.objects.create( user=user, email="john@example.org", primary=True, verified=True ) EmailAddress.objects.create( user=user, email="john@example.com", primary=False, verified=False ) resp = self.client.post( > reverse("account_login"), {"login": "john@example.com", "password": "doe"} ) allauth/account/tests/test_login.py:252: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ LoginTests.test_redirect_when_authenticated __________________ self = def test_redirect_when_authenticated(self): self._create_user_and_login() c = self.client > resp = c.get(reverse("account_login")) allauth/account/tests/test_login.py:82: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ LoginTests.test_username_containing_at ____________________ self = @override_settings( ACCOUNT_AUTHENTICATION_METHOD=app_settings.AuthenticationMethod.USERNAME_EMAIL ) def test_username_containing_at(self): user = get_user_model().objects.create(username="@raymond.penners") user.set_password("psst") user.save() EmailAddress.objects.create( user=user, email="raymond.penners@example.com", primary=True, verified=True, ) resp = self.client.post( > reverse("account_login"), {"login": "@raymond.penners", "password": "psst"}, ) allauth/account/tests/test_login.py:45: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ test_login_password_forgotten_link_present __________________ client = , db = None def test_login_password_forgotten_link_present(client, db): > form = LoginForm() allauth/account/tests/test_login.py:321: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/forms.py:132: in __init__ reset_url = reverse("account_reset_password") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_login_while_authenticated ________________________ settings = client = user_factory = .factory at 0x7f2985902b90> def test_login_while_authenticated(settings, client, user_factory): settings.ACCOUNT_AUTHENTICATED_LOGIN_REDIRECTS = False user_factory(username="john", email="john@example.org", password="doe") user_factory(username="jane", email="jane@example.org", password="doe") redirect_url = settings.LOGIN_REDIRECT_URL > resp = client.post(reverse("account_login"), {"login": "john", "password": "doe"}) allauth/account/tests/test_login.py:334: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________________ test_login_page ________________________________ client = , db = None def test_login_page(client, db): > resp = client.get(reverse("account_login")) allauth/account/tests/test_login.py:343: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________________ test_login_by_code ______________________________ client = user = request_login_by_code = .f at 0x7f2985292400> def test_login_by_code(client, user, request_login_by_code): > code = request_login_by_code(client, user.email) allauth/account/tests/test_login_by_code.py:36: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/tests/test_login_by_code.py:16: in f resp = client.get(reverse("account_request_login_code") + "?next=/foo") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_login_by_code_max_attempts ________________________ client = user = request_login_by_code = .f at 0x7f2986406770> settings = def test_login_by_code_max_attempts(client, user, request_login_by_code, settings): settings.ACCOUNT_LOGIN_BY_CODE_MAX_ATTEMPTS = 2 > request_login_by_code(client, user.email) allauth/account/tests/test_login_by_code.py:54: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/tests/test_login_by_code.py:16: in f resp = client.get(reverse("account_request_login_code") + "?next=/foo") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_login_by_code_unknown_user ________________________ mailoutbox = [], client = db = None def test_login_by_code_unknown_user(mailoutbox, client, db): resp = client.post( > reverse("account_request_login_code"), data={"email": "unknown@email.org"}, ) allauth/account/tests/test_login_by_code.py:71: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_login_by_code_required[True-True] ____________________ client = settings = user_factory = .factory at 0x7f2985323a00> password_factory = .f at 0x7f2985320040> setting = True, code_required = True @pytest.mark.parametrize( "setting,code_required", [ (True, True), ({"password"}, True), ({"socialaccount"}, False), ], ) def test_login_by_code_required( client, settings, user_factory, password_factory, setting, code_required ): password = password_factory() user = user_factory(password=password, email_verified=False) email_address = EmailAddress.objects.get(email=user.email) assert not email_address.verified settings.ACCOUNT_LOGIN_BY_CODE_REQUIRED = setting resp = client.post( > reverse("account_login"), data={"login": user.username, "password": password}, ) allauth/account/tests/test_login_by_code.py:96: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ test_login_by_code_required[setting1-True] __________________ client = settings = user_factory = .factory at 0x7f2985323270> password_factory = .f at 0x7f29853201a0> setting = {'password'}, code_required = True @pytest.mark.parametrize( "setting,code_required", [ (True, True), ({"password"}, True), ({"socialaccount"}, False), ], ) def test_login_by_code_required( client, settings, user_factory, password_factory, setting, code_required ): password = password_factory() user = user_factory(password=password, email_verified=False) email_address = EmailAddress.objects.get(email=user.email) assert not email_address.verified settings.ACCOUNT_LOGIN_BY_CODE_REQUIRED = setting resp = client.post( > reverse("account_login"), data={"login": user.username, "password": password}, ) allauth/account/tests/test_login_by_code.py:96: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_login_by_code_required[setting2-False] __________________ client = settings = user_factory = .factory at 0x7f2985322770> password_factory = .f at 0x7f29853203b0> setting = {'socialaccount'}, code_required = False @pytest.mark.parametrize( "setting,code_required", [ (True, True), ({"password"}, True), ({"socialaccount"}, False), ], ) def test_login_by_code_required( client, settings, user_factory, password_factory, setting, code_required ): password = password_factory() user = user_factory(password=password, email_verified=False) email_address = EmailAddress.objects.get(email=user.email) assert not email_address.verified settings.ACCOUNT_LOGIN_BY_CODE_REQUIRED = setting resp = client.post( > reverse("account_login"), data={"login": user.username, "password": password}, ) allauth/account/tests/test_login_by_code.py:96: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_login_by_code_redirect __________________________ client = user = request_login_by_code = .f at 0x7f29862c0930> def test_login_by_code_redirect(client, user, request_login_by_code): > request_login_by_code(client, user.email) allauth/account/tests/test_login_by_code.py:115: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/tests/test_login_by_code.py:16: in f resp = client.get(reverse("account_request_login_code") + "?next=/foo") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ LogoutTests.test_logout_view_on_get ______________________ self = @override_settings(ACCOUNT_LOGOUT_ON_GET=True) def test_logout_view_on_get(self): > c, resp = self._logout_view("get") allauth/account/tests/test_logout.py:31: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/tests/test_logout.py:63: in _logout_view return c, getattr(c, method)(reverse("account_logout")) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ LogoutTests.test_logout_view_on_post _____________________ self = @override_settings(ACCOUNT_LOGOUT_ON_GET=False) def test_logout_view_on_post(self): > c, resp = self._logout_view("get") allauth/account/tests/test_logout.py:36: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/tests/test_logout.py:63: in _logout_view return c, getattr(c, method)(reverse("account_logout")) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________________ test_add_new_email ______________________________ rf = user = settings = def test_add_new_email(rf, user, settings): settings.ACCOUNT_CHANGE_EMAIL = True request = rf.get("/") assert EmailAddress.objects.filter(user=user).count() == 1 > new_email = EmailAddress.objects.add_new_email(request, user, "new@email.org") allauth/account/tests/test_models.py:20: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/managers.py:50: in add_new_email instance.send_confirmation(request) allauth/account/models.py:107: in send_confirmation confirmation.send(request, signup=signup) allauth/account/models.py:135: in send get_adapter().send_confirmation_mail(request, self, signup) allauth/account/adapter.py:628: in send_confirmation_mail "activate_url": self.get_email_confirmation_url( allauth/account/adapter.py:597: in get_email_confirmation_url return flows.email_verification.get_email_verification_url( allauth/account/internal/flows/email_verification.py:94: in get_email_verification_url url = reverse("account_confirm_email", args=[emailconfirmation.key]) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_case_insensitive_password_reset _____________________ settings = enable_cache = None user_factory = .factory at 0x7f2985419b10> client = def test_case_insensitive_password_reset(settings, enable_cache, user_factory, client): settings.ACCOUNT_RATE_LIMITS = {"reset_password": "1/m"} user_factory(email="a@b.com") > resp = client.post(reverse("account_reset_password"), data={"email": "a@b.com"}) allauth/account/tests/test_ratelimit.py:7: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ test_user_with_mfa_only[False-True-expected_method_urlnames0] _________ user_factory = .factory at 0x7f298515fa00> with_totp = False, with_password = True expected_method_urlnames = ['account_reauthenticate'] client = @pytest.mark.parametrize( "with_totp,with_password,expected_method_urlnames", [ (False, True, ["account_reauthenticate"]), (True, True, ["account_reauthenticate", "mfa_reauthenticate"]), (True, False, ["mfa_reauthenticate"]), ], ) def test_user_with_mfa_only( user_factory, with_totp, with_password, expected_method_urlnames, client ): if not allauth_settings.MFA_ENABLED and with_totp: return user = user_factory(with_totp=with_totp, password=None if with_password else "!") assert user.has_usable_password() == with_password client.force_login(user) > methods = get_adapter().get_reauthentication_methods(user) allauth/account/tests/test_reauthentication.py:29: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/adapter.py:746: in get_reauthentication_methods "url": reverse("account_reauthenticate"), /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________ test_user_with_mfa_only[True-True-expected_method_urlnames1] _________ user_factory = .factory at 0x7f2985238670> with_totp = True, with_password = True expected_method_urlnames = ['account_reauthenticate', 'mfa_reauthenticate'] client = @pytest.mark.parametrize( "with_totp,with_password,expected_method_urlnames", [ (False, True, ["account_reauthenticate"]), (True, True, ["account_reauthenticate", "mfa_reauthenticate"]), (True, False, ["mfa_reauthenticate"]), ], ) def test_user_with_mfa_only( user_factory, with_totp, with_password, expected_method_urlnames, client ): if not allauth_settings.MFA_ENABLED and with_totp: return user = user_factory(with_totp=with_totp, password=None if with_password else "!") assert user.has_usable_password() == with_password client.force_login(user) > methods = get_adapter().get_reauthentication_methods(user) allauth/account/tests/test_reauthentication.py:29: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/adapter.py:746: in get_reauthentication_methods "url": reverse("account_reauthenticate"), /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ test_user_with_mfa_only[True-False-expected_method_urlnames2] _________ user_factory = .factory at 0x7f2985176090> with_totp = True, with_password = False expected_method_urlnames = ['mfa_reauthenticate'] client = @pytest.mark.parametrize( "with_totp,with_password,expected_method_urlnames", [ (False, True, ["account_reauthenticate"]), (True, True, ["account_reauthenticate", "mfa_reauthenticate"]), (True, False, ["mfa_reauthenticate"]), ], ) def test_user_with_mfa_only( user_factory, with_totp, with_password, expected_method_urlnames, client ): if not allauth_settings.MFA_ENABLED and with_totp: return user = user_factory(with_totp=with_totp, password=None if with_password else "!") assert user.has_usable_password() == with_password client.force_login(user) > methods = get_adapter().get_reauthentication_methods(user) allauth/account/tests/test_reauthentication.py:29: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/adapter.py:755: in get_reauthentication_methods "url": reverse("mfa_reauthenticate"), /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ test_reauthentication _____________________________ settings = auth_client = user_password = '927d701b-81f9-48bb-8a2c-b1eda9508894' def test_reauthentication(settings, auth_client, user_password): settings.ACCOUNT_REAUTHENTICATION_REQUIRED = True resp = auth_client.post( > reverse("account_email"), {"action_add": "", "email": "john3@example.org"}, ) allauth/account/tests/test_reauthentication.py:48: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_reset_password_unknown_account ______________________ client = settings = @pytest.mark.django_db def test_reset_password_unknown_account(client, settings): settings.ACCOUNT_PREVENT_ENUMERATION = True resp = client.post( > reverse("account_reset_password"), data={"email": "unknown@example.org"}, follow=True, ) allauth/account/tests/test_reset_password.py:36: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_reset_password_unknown_account_disabled _________________ client = settings = @pytest.mark.django_db def test_reset_password_unknown_account_disabled(client, settings): settings.ACCOUNT_PREVENT_ENUMERATION = True settings.ACCOUNT_EMAIL_UNKNOWN_ACCOUNTS = False client.post( > reverse("account_reset_password"), data={"email": "unknown@example.org"}, ) allauth/account/tests/test_reset_password.py:50: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ test_reset_password_next_url[-expected_location0] _______________ client = user = , query = '' expected_location = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] __proxy__ object at 0x7f2986a2f820> @pytest.mark.parametrize( "query,expected_location", [("", reverse_lazy("account_reset_password_done")), ("?next=/foo", "/foo")], ) def test_reset_password_next_url(client, user, query, expected_location): resp = client.post( > reverse("account_reset_password") + query, data={"email": user.email}, ) allauth/account/tests/test_reset_password.py:62: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_reset_password_next_url[?next=/foo-/foo] _________________ client = user = , query = '?next=/foo' expected_location = '/foo' @pytest.mark.parametrize( "query,expected_location", [("", reverse_lazy("account_reset_password_done")), ("?next=/foo", "/foo")], ) def test_reset_password_next_url(client, user, query, expected_location): resp = client.post( > reverse("account_reset_password") + query, data={"email": user.email}, ) allauth/account/tests/test_reset_password.py:62: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________ ResetPasswordTests.test_password_forgotten_no_username_hint __________ self = @override_settings( ACCOUNT_AUTHENTICATION_METHOD=app_settings.AuthenticationMethod.EMAIL ) def test_password_forgotten_no_username_hint(self): > user = self._request_new_password() allauth/account/tests/test_reset_password.py:117: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/tests/test_reset_password.py:128: in _request_new_password reverse("account_reset_password"), /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ ResetPasswordTests.test_password_forgotten_username_hint ___________ self = def test_password_forgotten_username_hint(self): > user = self._request_new_password() allauth/account/tests/test_reset_password.py:109: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/tests/test_reset_password.py:128: in _request_new_password reverse("account_reset_password"), /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____ ResetPasswordTests.test_password_reset_ACCOUNT_LOGIN_ON_PASSWORD_RESET ____ self = @override_settings(ACCOUNT_LOGIN_ON_PASSWORD_RESET=True) def test_password_reset_ACCOUNT_LOGIN_ON_PASSWORD_RESET(self): > user = self._request_new_password() allauth/account/tests/test_reset_password.py:233: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/tests/test_reset_password.py:128: in _request_new_password reverse("account_reset_password"), /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___ ResetPasswordTests.test_password_reset_flow_with_another_user_logged_in ____ self = @override_settings( ACCOUNT_AUTHENTICATION_METHOD=app_settings.AuthenticationMethod.EMAIL ) def test_password_reset_flow_with_another_user_logged_in(self): """ Tests the password reset flow: if User B requested a password reset earlier and now User A is logged in, User B now clicks on the link, ensure User A is logged out before continuing. """ # Request new password > self._request_new_password() allauth/account/tests/test_reset_password.py:175: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/tests/test_reset_password.py:128: in _request_new_password reverse("account_reset_password"), /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ ResetPasswordTests.test_password_reset_flow_with_email_changed ________ self = def test_password_reset_flow_with_email_changed(self): """ Test that the password reset token is invalidated if the user email address was changed. """ > user = self._request_new_password() allauth/account/tests/test_reset_password.py:218: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/tests/test_reset_password.py:128: in _request_new_password reverse("account_reset_password"), /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ ResetPasswordTests.test_password_reset_flow_with_empty_session ________ self = def test_password_reset_flow_with_empty_session(self): """ Test the password reset flow when the session is empty: requesting a new password, receiving the reset link via email, following the link, getting redirected to the new link (without the token) Copying the link and using it in a DIFFERENT client (Browser/Device). """ # Request new password > self._request_new_password() allauth/account/tests/test_reset_password.py:144: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/tests/test_reset_password.py:128: in _request_new_password reverse("account_reset_password"), /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ ResetPasswordTests.test_password_reset_get __________________ self = def test_password_reset_get(self): > resp = self.client.get(reverse("account_reset_password")) allauth/account/tests/test_reset_password.py:92: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ ResetPasswordTests.test_set_password_not_allowed _______________ self = def test_set_password_not_allowed(self): user = self._create_user_and_login(True) pwd = "!*123i1uwn12W23" self.assertFalse(user.check_password(pwd)) resp = self.client.post( > reverse("account_set_password"), data={"password1": pwd, "password2": pwd}, ) allauth/account/tests/test_reset_password.py:100: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_password_reset_flow ___________________________ client = user = , mailoutbox = [] settings = def test_password_reset_flow(client, user, mailoutbox, settings): """ Tests the password reset flow: requesting a new password, receiving the reset link via email and finally resetting the password to a new value. """ settings.ACCOUNT_EMAIL_NOTIFICATIONS = True # Request new password client.post( > reverse("account_reset_password"), data={"email": user.email}, ) allauth/account/tests/test_reset_password.py:274: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ test_reset_password_from_key_next_url[None-expected_location0] ________ user = client = password_factory = .f at 0x7f2985323a00> next_url = None expected_location = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] __proxy__ object at 0x7f2987851250> password_reset_url = .f at 0x7f2985320670> @pytest.mark.parametrize( "next_url,expected_location", [(None, reverse_lazy("account_reset_password_from_key_done")), ("/foo", "/foo")], ) def test_reset_password_from_key_next_url( user, client, password_factory, next_url, expected_location, password_reset_url ): > url = password_reset_url(user) allauth/account/tests/test_reset_password.py:341: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/tests/test_reset_password.py:25: in f return reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_reset_password_from_key_next_url[/foo-/foo] _______________ user = client = password_factory = .f at 0x7f2985175640> next_url = '/foo', expected_location = '/foo' password_reset_url = .f at 0x7f2985174d50> @pytest.mark.parametrize( "next_url,expected_location", [(None, reverse_lazy("account_reset_password_from_key_done")), ("/foo", "/foo")], ) def test_reset_password_from_key_next_url( user, client, password_factory, next_url, expected_location, password_reset_url ): > url = password_reset_url(user) allauth/account/tests/test_reset_password.py:341: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/tests/test_reset_password.py:25: in f return reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_user_email_unicode_collision _______________________ settings = rf = user_factory = .factory at 0x7f29850a4670> mailoutbox = [] def test_user_email_unicode_collision(settings, rf, user_factory, mailoutbox): settings.ACCOUNT_PREVENT_ENUMERATION = False user_factory(username="mike123", email="mike@example.org") user_factory(username="mike456", email="mıke@example.org") data = {"email": "mıke@example.org"} form = ResetPasswordForm(data) assert form.is_valid() > form.save(rf.get("/")) allauth/account/tests/test_security.py:11: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/forms.py:622: in save url = adapter.get_reset_password_from_key_url(key) allauth/account/adapter.py:586: in get_reset_password_from_key_url return flows.password_reset.get_reset_password_from_key_url(self.request, key) allauth/account/internal/flows/password_reset.py:57: in get_reset_password_from_key_url path = reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_user_email_domain_unicode_collision ___________________ settings = rf = user_factory = .factory at 0x7f2985238d50> mailoutbox = [] def test_user_email_domain_unicode_collision(settings, rf, user_factory, mailoutbox): settings.ACCOUNT_PREVENT_ENUMERATION = False user_factory(username="mike123", email="mike@ixample.org") user_factory(username="mike456", email="mike@ıxample.org") data = {"email": "mike@ıxample.org"} form = ResetPasswordForm(data) assert form.is_valid() > form.save(rf.get("/")) allauth/account/tests/test_security.py:23: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/forms.py:622: in save url = adapter.get_reset_password_from_key_url(key) allauth/account/adapter.py:586: in get_reset_password_from_key_url return flows.password_reset.get_reset_password_from_key_url(self.request, key) allauth/account/internal/flows/password_reset.py:57: in get_reset_password_from_key_url path = reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ SignupTests.test_django_password_validation __________________ self = @override_settings( AUTH_PASSWORD_VALIDATORS=[ { "NAME": "django.contrib.auth.password_validation.MinimumLengthValidator", "OPTIONS": { "min_length": 9, }, } ] ) def test_django_password_validation(self): resp = self.client.post( > reverse("account_signup"), { "username": "johndoe", "email": "john@example.com", "password1": "johndoe", "password2": "johndoe", }, ) allauth/account/tests/test_signup.py:259: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ SignupTests.test_signup_email_twice ______________________ self = @override_settings( ACCOUNT_USERNAME_REQUIRED=True, ACCOUNT_SIGNUP_EMAIL_ENTER_TWICE=True ) def test_signup_email_twice(self): request = RequestFactory().post( > reverse("account_signup"), { "username": "johndoe", "email": "john@example.org", "email2": "john@example.org", "password1": "johndoe", "password2": "johndoe", }, ) allauth/account/tests/test_signup.py:228: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ SignupTests.test_signup_other_email_verified_externally ____________ self = def test_signup_other_email_verified_externally(self): """ John is invited on john@example.org, but signs up via john@example.com. Email verification is by-passed, their home email address is used as a secondary. """ > user = self._test_signup_email_verified_externally( "john@example.com", "john@example.org" ) allauth/account/tests/test_signup.py:165: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/tests/test_signup.py:179: in _test_signup_email_verified_externally reverse("account_signup"), /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ SignupTests.test_signup_password_twice_form_error _______________ self = @override_settings( ACCOUNT_USERNAME_REQUIRED=True, ACCOUNT_SIGNUP_PASSWORD_ENTER_TWICE=True, ) def test_signup_password_twice_form_error(self): resp = self.client.post( > reverse("account_signup"), data={ "username": "johndoe", "email": "john@example.org", "password1": "johndoe", "password2": "janedoe", }, ) allauth/account/tests/test_signup.py:209: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ SignupTests.test_signup_same_email_verified_externally ____________ self = def test_signup_same_email_verified_externally(self): > user = self._test_signup_email_verified_externally( "john@example.com", "john@example.com" ) allauth/account/tests/test_signup.py:151: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/tests/test_signup.py:179: in _test_signup_email_verified_externally reverse("account_signup"), /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ test_prevent_enumeration_with_mandatory_verification _____________ settings = user_factory = .factory at 0x7f29854f89e0> email_factory = .factory at 0x7f29853a8300> def test_prevent_enumeration_with_mandatory_verification( settings, user_factory, email_factory ): settings.ACCOUNT_PREVENT_ENUMERATION = True settings.ACCOUNT_AUTHENTICATION_METHOD = app_settings.AuthenticationMethod.EMAIL settings.ACCOUNT_EMAIL_VERIFICATION = app_settings.EmailVerificationMethod.MANDATORY user = user_factory(username="john", email="john@example.org", password="doe") c = Client() resp = c.post( > reverse("account_signup"), { "username": "johndoe", "email": email_factory(email=user.email, mixed_case=True), "password1": "johndoe", "password2": "johndoe", }, ) allauth/account/tests/test_signup.py:284: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_prevent_enumeration_off _________________________ settings = user_factory = .factory at 0x7f298555f270> email_factory = .factory at 0x7f298555e560> def test_prevent_enumeration_off(settings, user_factory, email_factory): settings.ACCOUNT_PREVENT_ENUMERATION = False settings.ACCOUNT_AUTHENTICATION_METHOD = app_settings.AuthenticationMethod.EMAIL settings.ACCOUNT_EMAIL_VERIFICATION = app_settings.EmailVerificationMethod.MANDATORY user = user_factory(username="john", email="john@example.org", password="doe") c = Client() resp = c.post( > reverse("account_signup"), { "username": "johndoe", "email": email_factory(email=user.email, mixed_case=True), "password1": "johndoe", "password2": "johndoe", }, ) allauth/account/tests/test_signup.py:306: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_prevent_enumeration_strictly _______________________ settings = user_factory = .factory at 0x7f298555c670> email_factory = .factory at 0x7f298555fed0> def test_prevent_enumeration_strictly(settings, user_factory, email_factory): settings.ACCOUNT_PREVENT_ENUMERATION = "strict" settings.ACCOUNT_AUTHENTICATION_METHOD = app_settings.AuthenticationMethod.EMAIL settings.ACCOUNT_EMAIL_VERIFICATION = app_settings.EmailVerificationMethod.NONE user = user_factory(username="john", email="john@example.org", password="doe") c = Client() resp = c.post( > reverse("account_signup"), { "username": "johndoe", "email": email_factory(email=user.email, mixed_case=True), "password1": "johndoe", "password2": "johndoe", }, ) allauth/account/tests/test_signup.py:327: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_prevent_enumeration_on __________________________ settings = user_factory = .factory at 0x7f29853a8f60> email_factory = .factory at 0x7f298555e4b0> def test_prevent_enumeration_on(settings, user_factory, email_factory): settings.ACCOUNT_PREVENT_ENUMERATION = True settings.ACCOUNT_AUTHENTICATION_METHOD = app_settings.AuthenticationMethod.EMAIL settings.ACCOUNT_EMAIL_VERIFICATION = app_settings.EmailVerificationMethod.NONE user = user_factory(username="john", email="john@example.org", password="doe") c = Client() resp = c.post( > reverse("account_signup"), { "username": "johndoe", "email": email_factory(email=user.email, mixed_case=True), "password1": "johndoe", "password2": "johndoe", }, ) allauth/account/tests/test_signup.py:347: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_get_initial_with_valid_email _______________________ @pytest.mark.django_db def test_get_initial_with_valid_email(): """Test that the email field is populated with a valid email.""" request = RequestFactory().get("/signup/?email=test@example.com") from allauth.account.views import signup SessionMiddleware(lambda request: None).process_request(request) request.user = AnonymousUser() with context.request_context(request): > view = signup(request) allauth/account/tests/test_signup.py:370: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/views/generic/base.py:105: in view return self.dispatch(request, *args, **kwargs) /usr/lib/python3.14/site-packages/django/utils/decorators.py:48: in _wrapper return bound_method(*args, **kwargs) allauth/decorators.py:12: in wrap resp = function(request, *args, **kwargs) /usr/lib/python3.14/site-packages/django/utils/decorators.py:48: in _wrapper return bound_method(*args, **kwargs) /usr/lib/python3.14/site-packages/django/utils/decorators.py:48: in _wrapper return bound_method(*args, **kwargs) /usr/lib/python3.14/site-packages/django/views/decorators/debug.py:143: in sensitive_post_parameters_wrapper return view(request, *args, **kwargs) /usr/lib/python3.14/site-packages/django/utils/decorators.py:48: in _wrapper return bound_method(*args, **kwargs) /usr/lib/python3.14/site-packages/django/views/decorators/cache.py:80: in _view_wrapper response = view_func(request, *args, **kwargs) allauth/account/views.py:158: in dispatch return super().dispatch(request, *args, **kwargs) /usr/lib/python3.14/site-packages/django/utils/decorators.py:48: in _wrapper return bound_method(*args, **kwargs) /usr/lib/python3.14/site-packages/django/utils/decorators.py:48: in _wrapper return bound_method(*args, **kwargs) /usr/lib/python3.14/site-packages/django/views/decorators/cache.py:80: in _view_wrapper response = view_func(request, *args, **kwargs) allauth/account/mixins.py:53: in dispatch response = super().dispatch(request, *args, **kwargs) allauth/account/mixins.py:118: in dispatch return super().dispatch(request, *args, **kwargs) /usr/lib/python3.14/site-packages/django/views/generic/base.py:144: in dispatch return handler(request, *args, **kwargs) allauth/account/mixins.py:72: in get response = super().get(request, *args, **kwargs) /usr/lib/python3.14/site-packages/django/views/generic/edit.py:142: in get return self.render_to_response(self.get_context_data()) allauth/account/views.py:193: in get_context_data login_url = self.passthrough_next_url(reverse("account_login")) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_signup_user_model_no_email ________________________ settings = client = password_factory = .f at 0x7f29853aa980> db = None, mailoutbox = [] def test_signup_user_model_no_email(settings, client, password_factory, db, mailoutbox): settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_EMAIL_VERIFICATION = app_settings.EmailVerificationMethod.MANDATORY settings.ACCOUNT_USER_MODEL_EMAIL_FIELD = None password = password_factory() email = "user@example.com" resp = client.post( > reverse("account_signup"), { "email": email, "password1": password, "password2": password, }, ) allauth/account/tests/test_signup.py:382: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ test_email_lower_case _____________________________ db = None settings = def test_email_lower_case(db, settings): settings.ACCOUNT_AUTHENTICATION_METHOD = app_settings.AuthenticationMethod.EMAIL settings.ACCOUNT_EMAIL_VERIFICATION = app_settings.EmailVerificationMethod.NONE c = Client() resp = c.post( > reverse("account_signup"), { "username": "johndoe", "email": "JoHn@DoE.oRg", "password1": "johndoe", "password2": "johndoe", }, ) allauth/account/tests/test_signup.py:401: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ test_does_not_create_user_when_honeypot_filled_out ______________ client = , db = None settings = def test_does_not_create_user_when_honeypot_filled_out(client, db, settings): settings.ACCOUNT_SIGNUP_FORM_HONEYPOT_FIELD = "phone_number" resp = client.post( > reverse("account_signup"), { "username": "johndoe", "email": "john@example.com", "password1": "Password1@", "password2": "Password1@", "phone_number": "5551231234", }, ) allauth/account/tests/test_signup.py:416: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_create_user_when_honeypot_not_filled_out _________________ client = , db = None settings = def test_create_user_when_honeypot_not_filled_out(client, db, settings): settings.ACCOUNT_SIGNUP_FORM_HONEYPOT_FIELD = "phone_number" resp = client.post( > reverse("account_signup"), { "username": "johndoe", "email": "john@example.com", "password1": "Password1@", "password2": "Password1@", "phone_number": "", }, ) allauth/account/tests/test_signup.py:433: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ UtilsTests.test_email_escaping ________________________ self = def test_email_escaping(self): site_name = "testserver" if allauth.app_settings.SITES_ENABLED: from django.contrib.sites.models import Site site = Site.objects.get_current() site.name = site_name = '' site.save() u = get_user_model().objects.create(username="test", email="user@example.com") request = RequestFactory().get("/") > EmailAddress.objects.add_email(request, u, u.email, confirm=True) allauth/account/tests/test_utils.py:103: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/account/managers.py:60: in add_email email_address.send_confirmation(request, signup=signup) allauth/account/models.py:107: in send_confirmation confirmation.send(request, signup=signup) allauth/account/models.py:135: in send get_adapter().send_confirmation_mail(request, self, signup) allauth/account/adapter.py:628: in send_confirmation_mail "activate_url": self.get_email_confirmation_url( allauth/account/adapter.py:597: in get_email_confirmation_url return flows.email_verification.get_email_verification_url( allauth/account/internal/flows/email_verification.py:94: in get_email_verification_url url = reverse("account_confirm_email", args=[emailconfirmation.key]) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_redirect_noreversematch _________________________ auth_client = def test_redirect_noreversematch(auth_client): # We used to call `django.shortcuts.redirect()` as is, but that one throws a # `NoReverseMatch`, resulting in 500s. > resp = auth_client.post(reverse("account_logout") + "?next=badurlname") allauth/account/tests/test_utils.py:134: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ test_list_email[app] _____________________________ auth_client = user = headless_reverse = .rev at 0x7f2984a4b530> def test_list_email(auth_client, user, headless_reverse): resp = auth_client.get( > headless_reverse("headless:account:manage_email"), ) allauth/headless/account/tests/test_change_email.py:6: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_list_email[browser] ___________________________ auth_client = user = headless_reverse = .rev at 0x7f29849c0040> def test_list_email(auth_client, user, headless_reverse): resp = auth_client.get( > headless_reverse("headless:account:manage_email"), ) allauth/headless/account/tests/test_change_email.py:6: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ test_remove_email[app] ____________________________ auth_client = user = email_factory = .factory at 0x7f29855b6c40> headless_reverse = .rev at 0x7f29855b6b90> def test_remove_email(auth_client, user, email_factory, headless_reverse): addr = EmailAddress.objects.create(email=email_factory(), user=user) assert EmailAddress.objects.filter(user=user).count() == 2 resp = auth_client.delete( > headless_reverse("headless:account:manage_email"), data={"email": addr.email}, content_type="application/json", ) allauth/headless/account/tests/test_change_email.py:15: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_remove_email[browser] __________________________ auth_client = user = email_factory = .factory at 0x7f29855b77f0> headless_reverse = .rev at 0x7f29855b5170> def test_remove_email(auth_client, user, email_factory, headless_reverse): addr = EmailAddress.objects.create(email=email_factory(), user=user) assert EmailAddress.objects.filter(user=user).count() == 2 resp = auth_client.delete( > headless_reverse("headless:account:manage_email"), data={"email": addr.email}, content_type="application/json", ) allauth/headless/account/tests/test_change_email.py:15: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ test_add_email[app] ______________________________ auth_client = user = email_factory = .factory at 0x7f29855b4670> headless_reverse = .rev at 0x7f29855c8ca0> def test_add_email(auth_client, user, email_factory, headless_reverse): new_email = email_factory() resp = auth_client.post( > headless_reverse("headless:account:manage_email"), data={"email": new_email}, content_type="application/json", ) allauth/headless/account/tests/test_change_email.py:27: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_add_email[browser] ____________________________ auth_client = user = email_factory = .factory at 0x7f29855c9640> headless_reverse = .rev at 0x7f29855f01a0> def test_add_email(auth_client, user, email_factory, headless_reverse): new_email = email_factory() resp = auth_client.post( > headless_reverse("headless:account:manage_email"), data={"email": new_email}, content_type="application/json", ) allauth/headless/account/tests/test_change_email.py:27: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_change_primary[app] ___________________________ auth_client = user = email_factory = .factory at 0x7f29855f19b0> headless_reverse = .rev at 0x7f29855f1bc0> def test_change_primary(auth_client, user, email_factory, headless_reverse): addr = EmailAddress.objects.create( email=email_factory(), user=user, verified=True, primary=False ) resp = auth_client.patch( > headless_reverse("headless:account:manage_email"), data={"email": addr.email, "primary": True}, content_type="application/json", ) allauth/headless/account/tests/test_change_email.py:41: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_change_primary[browser] _________________________ auth_client = user = email_factory = .factory at 0x7f29855f1170> headless_reverse = .rev at 0x7f2985476fb0> def test_change_primary(auth_client, user, email_factory, headless_reverse): addr = EmailAddress.objects.create( email=email_factory(), user=user, verified=True, primary=False ) resp = auth_client.patch( > headless_reverse("headless:account:manage_email"), data={"email": addr.email, "primary": True}, content_type="application/json", ) allauth/headless/account/tests/test_change_email.py:41: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_resend_verification[app] _________________________ auth_client = user = email_factory = .factory at 0x7f29850a5590> headless_reverse = .rev at 0x7f298523bcc0> mailoutbox = [] def test_resend_verification( auth_client, user, email_factory, headless_reverse, mailoutbox ): addr = EmailAddress.objects.create(email=email_factory(), user=user, verified=False) resp = auth_client.put( > headless_reverse("headless:account:manage_email"), data={"email": addr.email}, content_type="application/json", ) allauth/headless/account/tests/test_change_email.py:55: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_resend_verification[browser] _______________________ auth_client = user = email_factory = .factory at 0x7f29854f9010> headless_reverse = .rev at 0x7f29854f8670> mailoutbox = [] def test_resend_verification( auth_client, user, email_factory, headless_reverse, mailoutbox ): addr = EmailAddress.objects.create(email=email_factory(), user=user, verified=False) resp = auth_client.put( > headless_reverse("headless:account:manage_email"), data={"email": addr.email}, content_type="application/json", ) allauth/headless/account/tests/test_change_email.py:55: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_email_rate_limit[app] __________________________ auth_client = user = email_factory = .factory at 0x7f29854f9b10> headless_reverse = .rev at 0x7f2985176140> settings = enable_cache = None def test_email_rate_limit( auth_client, user, email_factory, headless_reverse, settings, enable_cache ): settings.ACCOUNT_RATE_LIMITS = {"manage_email": "1/m/ip"} for attempt in range(2): new_email = email_factory() resp = auth_client.post( > headless_reverse("headless:account:manage_email"), data={"email": new_email}, content_type="application/json", ) allauth/headless/account/tests/test_change_email.py:70: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_email_rate_limit[browser] ________________________ auth_client = user = email_factory = .factory at 0x7f2985292400> headless_reverse = .rev at 0x7f2985322f00> settings = enable_cache = None def test_email_rate_limit( auth_client, user, email_factory, headless_reverse, settings, enable_cache ): settings.ACCOUNT_RATE_LIMITS = {"manage_email": "1/m/ip"} for attempt in range(2): new_email = email_factory() resp = auth_client.post( > headless_reverse("headless:account:manage_email"), data={"email": new_email}, content_type="application/json", ) allauth/headless/account/tests/test_change_email.py:70: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_resend_verification_rate_limit[app] ___________________ auth_client = user = email_factory = .factory at 0x7f2984e98f60> headless_reverse = .rev at 0x7f2984ebca90> settings = enable_cache = None, mailoutbox = [] def test_resend_verification_rate_limit( auth_client, user, email_factory, headless_reverse, settings, enable_cache, mailoutbox, ): settings.ACCOUNT_RATE_LIMITS = {"confirm_email": "1/m/ip"} for attempt in range(2): addr = EmailAddress.objects.create( email=email_factory(), user=user, verified=False ) resp = auth_client.put( > headless_reverse("headless:account:manage_email"), data={"email": addr.email}, content_type="application/json", ) allauth/headless/account/tests/test_change_email.py:94: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_resend_verification_rate_limit[browser] _________________ auth_client = user = email_factory = .factory at 0x7f29851f4040> headless_reverse = .rev at 0x7f29854181a0> settings = enable_cache = None, mailoutbox = [] def test_resend_verification_rate_limit( auth_client, user, email_factory, headless_reverse, settings, enable_cache, mailoutbox, ): settings.ACCOUNT_RATE_LIMITS = {"confirm_email": "1/m/ip"} for attempt in range(2): addr = EmailAddress.objects.create( email=email_factory(), user=user, verified=False ) resp = auth_client.put( > headless_reverse("headless:account:manage_email"), data={"email": addr.email}, content_type="application/json", ) allauth/headless/account/tests/test_change_email.py:94: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______ test_change_password[app-True-request_data0-response_data0-400] ________ auth_client = user = request_data = {'current_password': 'wrong', 'new_password': 'b52948f9-0232-4d8b-837a-f8b0299ccfc9'} response_data = {'errors': [{'code': 'enter_current_password', 'message': 'Please type your current password.', 'param': 'current_password'}], 'status': 400} status_code = 400, has_password = True user_password = 'e7624150-5f52-41c9-8004-2c2068794404' password_factory = .f at 0x7f298555df30> settings = mailoutbox = [] headless_reverse = .rev at 0x7f298555d9b0> headless_client = 'app' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______ test_change_password[app-True-request_data1-response_data1-200] ________ auth_client = user = request_data = {'current_password': '656b1fc4-9189-4e2c-acee-a254ff64cda5', 'new_password': 'dd2401d4-a2b0-4d3c-9366-45697605c8d1'} response_data = {'data': {'methods': [], 'user': }, 'meta': {'is_authenticated': True}, 'status': 200} status_code = 200, has_password = True user_password = '656b1fc4-9189-4e2c-acee-a254ff64cda5' password_factory = .f at 0x7f29853a85c0> settings = mailoutbox = [] headless_reverse = .rev at 0x7f29853aa090> headless_client = 'app' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______ test_change_password[app-True-request_data2-response_data2-400] ________ auth_client = user = request_data = {'current_password': '466dccdc-2ddf-459e-9dd1-d5bf9e31d041', 'new_password': 'a'} response_data = {'errors': [{'code': 'password_too_short', 'message': 'This password is too short. It must contain at least 6 characters.', 'param': 'new_password'}], 'status': 400} status_code = 400, has_password = True user_password = '466dccdc-2ddf-459e-9dd1-d5bf9e31d041' password_factory = .f at 0x7f29855c81a0> settings = mailoutbox = [] headless_reverse = .rev at 0x7f29853226c0> headless_client = 'app' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______ test_change_password[app-True-request_data3-response_data3-400] ________ auth_client = user = request_data = {'current_password': '32183d80-7d40-4bc9-a337-19b92973fc13', 'new_password': ''} response_data = {'errors': [{'code': 'required', 'message': 'This field is required.', 'param': 'new_password'}], 'status': 400} status_code = 400, has_password = True user_password = '32183d80-7d40-4bc9-a337-19b92973fc13' password_factory = .f at 0x7f29855f1220> settings = mailoutbox = [] headless_reverse = .rev at 0x7f29855f0880> headless_client = 'app' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______ test_change_password[app-True-request_data4-response_data4-400] ________ auth_client = user = request_data = {'current_password': '', 'new_password': '62377d4f-ae81-453b-b5e6-4d4182df3631'} response_data = {'errors': [{'code': 'required', 'message': 'This field is required.', 'param': 'current_password'}], 'status': 400} status_code = 400, has_password = True user_password = 'e55df1f1-a3d8-4c33-b355-a8e4c0603b7d' password_factory = .f at 0x7f29855f2980> settings = mailoutbox = [] headless_reverse = .rev at 0x7f29855f3690> headless_client = 'app' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______ test_change_password[app-True-request_data5-response_data5-400] ________ auth_client = user = request_data = {'new_password': '82e92cba-5ed6-4c99-94e3-b7733e50d99b'} response_data = {'errors': [{'code': 'required', 'message': 'This field is required.', 'param': 'current_password'}], 'status': 400} status_code = 400, has_password = True user_password = '9d3bf180-eb6e-440a-9d6f-d7724fe86c70' password_factory = .f at 0x7f29855f2400> settings = mailoutbox = [] headless_reverse = .rev at 0x7f29855f1640> headless_client = 'app' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______ test_change_password[app-False-request_data6-response_data6-200] _______ auth_client = user = request_data = {'current_password': '', 'new_password': '1d9aa7ca-37e2-4f54-a3ef-15d163525b2a'} response_data = {'data': {'methods': [], 'user': }, 'meta': {'is_authenticated': True}, 'status': 200} status_code = 200, has_password = False user_password = '1a1684ff-7324-4eca-ad1a-2ba15778ac2a' password_factory = .f at 0x7f2985290ca0> settings = mailoutbox = [] headless_reverse = .rev at 0x7f29852921f0> headless_client = 'app' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______ test_change_password[app-False-request_data7-response_data7-200] _______ auth_client = user = request_data = {'new_password': '1ac0b9e0-4b9b-4327-b76a-a260957f6309'} response_data = {'data': {'methods': [], 'user': }, 'meta': {'is_authenticated': True}, 'status': 200} status_code = 200, has_password = False user_password = 'a15a3592-6cf2-4923-8975-693c028c7688' password_factory = .f at 0x7f2985293060> settings = mailoutbox = [] headless_reverse = .rev at 0x7f2985292ae0> headless_client = 'app' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____ test_change_password[browser-True-request_data0-response_data0-400] ______ auth_client = user = request_data = {'current_password': 'wrong', 'new_password': '4d8b0bd2-cbe1-4924-ad72-a913c1b8eaf3'} response_data = {'errors': [{'code': 'enter_current_password', 'message': 'Please type your current password.', 'param': 'current_password'}], 'status': 400} status_code = 400, has_password = True user_password = 'c0322885-05b7-407b-a639-76578f48a5d0' password_factory = .f at 0x7f298541aa30> settings = mailoutbox = [] headless_reverse = .rev at 0x7f29854192d0> headless_client = 'browser' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____ test_change_password[browser-True-request_data1-response_data1-200] ______ auth_client = user = request_data = {'current_password': 'b1771e14-424e-4f74-9c99-45f48a1e1226', 'new_password': '9c6388b8-7da6-437c-bff8-e1de1214abbf'} response_data = {'data': {'methods': [], 'user': }, 'meta': {'is_authenticated': True}, 'status': 200} status_code = 200, has_password = True user_password = 'b1771e14-424e-4f74-9c99-45f48a1e1226' password_factory = .f at 0x7f2985418880> settings = mailoutbox = [] headless_reverse = .rev at 0x7f298541b320> headless_client = 'browser' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____ test_change_password[browser-True-request_data2-response_data2-400] ______ auth_client = user = request_data = {'current_password': 'b712f82d-94d2-41db-aacc-43d60fdefc58', 'new_password': 'a'} response_data = {'errors': [{'code': 'password_too_short', 'message': 'This password is too short. It must contain at least 6 characters.', 'param': 'new_password'}], 'status': 400} status_code = 400, has_password = True user_password = 'b712f82d-94d2-41db-aacc-43d60fdefc58' password_factory = .f at 0x7f29854762a0> settings = mailoutbox = [] headless_reverse = .rev at 0x7f2985477740> headless_client = 'browser' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____ test_change_password[browser-True-request_data3-response_data3-400] ______ auth_client = user = request_data = {'current_password': '98eefd28-e1f7-4ee7-8bc5-ece41cc84bee', 'new_password': ''} response_data = {'errors': [{'code': 'required', 'message': 'This field is required.', 'param': 'new_password'}], 'status': 400} status_code = 400, has_password = True user_password = '98eefd28-e1f7-4ee7-8bc5-ece41cc84bee' password_factory = .f at 0x7f29855b5a60> settings = mailoutbox = [] headless_reverse = .rev at 0x7f29855b6da0> headless_client = 'browser' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____ test_change_password[browser-True-request_data4-response_data4-400] ______ auth_client = user = request_data = {'current_password': '', 'new_password': '80bd1cfb-70c5-4128-a605-5103afc02514'} response_data = {'errors': [{'code': 'required', 'message': 'This field is required.', 'param': 'current_password'}], 'status': 400} status_code = 400, has_password = True user_password = '5830d7cb-a188-415f-a305-04a2c363890a' password_factory = .f at 0x7f29853a8930> settings = mailoutbox = [] headless_reverse = .rev at 0x7f2984a4b740> headless_client = 'browser' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____ test_change_password[browser-True-request_data5-response_data5-400] ______ auth_client = user = request_data = {'new_password': 'b33e0bc6-447d-41d4-aeb8-64130d63441e'} response_data = {'errors': [{'code': 'required', 'message': 'This field is required.', 'param': 'current_password'}], 'status': 400} status_code = 400, has_password = True user_password = 'a40ccc3b-bb17-4f8e-8de1-c33bfcc322c3' password_factory = .f at 0x7f298555cb40> settings = mailoutbox = [] headless_reverse = .rev at 0x7f298555f320> headless_client = 'browser' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____ test_change_password[browser-False-request_data6-response_data6-200] _____ auth_client = user = request_data = {'current_password': '', 'new_password': 'e06f37f8-f5c3-4121-84c9-7de19ce7b756'} response_data = {'data': {'methods': [], 'user': }, 'meta': {'is_authenticated': True}, 'status': 200} status_code = 200, has_password = False user_password = 'ba0e06f2-f6bb-40f0-8c51-7e5d13fd9b73' password_factory = .f at 0x7f29854fb270> settings = mailoutbox = [] headless_reverse = .rev at 0x7f29854f9430> headless_client = 'browser' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____ test_change_password[browser-False-request_data7-response_data7-200] _____ auth_client = user = request_data = {'new_password': 'a4a6b6da-d11a-44a3-b7cd-7bcffbf6c6bb'} response_data = {'data': {'methods': [], 'user': }, 'meta': {'is_authenticated': True}, 'status': 200} status_code = 200, has_password = False user_password = '4638dfe6-57a5-406e-93e0-9ef9085227f3' password_factory = .f at 0x7f29849c1170> settings = mailoutbox = [] headless_reverse = .rev at 0x7f29849c3c10> headless_client = 'browser' @pytest.mark.parametrize( "has_password,request_data,response_data,status_code", [ # Wrong current password ( True, {"current_password": "wrong", "new_password": "{password_factory}"}, { "status": 400, "errors": [ { "param": "current_password", "message": "Please type your current password.", "code": "enter_current_password", } ], }, 400, ), # Happy flow, regular password change ( True, { "current_password": "{user_password}", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # New password does not match constraints ( True, { "current_password": "{user_password}", "new_password": "a", }, { "status": 400, "errors": [ { "param": "new_password", "code": "password_too_short", "message": "This password is too short. It must contain at least 6 characters.", } ], }, 400, ), # New password not empty ( True, { "current_password": "{user_password}", "new_password": "", }, { "status": 400, "errors": [ { "param": "new_password", "code": "required", "message": "This field is required.", } ], }, 400, ), # Current password not blank ( True, { "current_password": "", "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password missing ( True, { "new_password": "{password_factory}", }, { "status": 400, "errors": [ { "param": "current_password", "message": "This field is required.", "code": "required", } ], }, 400, ), # Current password not set, happy flow ( False, { "current_password": "", "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), # Current password not set, current_password absent ( False, { "new_password": "{password_factory}", }, { "status": 200, "meta": {"is_authenticated": True}, "data": { "user": ANY, "methods": [], }, }, 200, ), ], ) def test_change_password( auth_client, user, request_data, response_data, status_code, has_password, user_password, password_factory, settings, mailoutbox, headless_reverse, headless_client, ): request_data = copy.deepcopy(request_data) response_data = copy.deepcopy(response_data) settings.ACCOUNT_EMAIL_NOTIFICATIONS = True if not has_password: user.set_unusable_password() user.save(update_fields=["password"]) auth_client.force_login(user) if request_data.get("current_password") == "{user_password}": request_data["current_password"] = user_password if request_data.get("new_password") == "{password_factory}": request_data["new_password"] = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data=request_data, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_change_password_rate_limit[app] _____________________ enable_cache = None auth_client = user = user_password = 'd72d69de-fd61-4a22-96f4-b3903155e88a' password_factory = .f at 0x7f2985322fb0> settings = headless_reverse = .rev at 0x7f2985322400> def test_change_password_rate_limit( enable_cache, auth_client, user, user_password, password_factory, settings, headless_reverse, ): settings.ACCOUNT_RATE_LIMITS = {"change_password": "1/m/ip"} for attempt in range(2): new_password = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data={ "current_password": user_password, "new_password": new_password, }, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:210: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_change_password_rate_limit[browser] ___________________ enable_cache = None auth_client = user = user_password = '679afc22-f29d-461a-b91b-2211626a5a58' password_factory = .f at 0x7f2985474250> settings = headless_reverse = .rev at 0x7f2985476560> def test_change_password_rate_limit( enable_cache, auth_client, user, user_password, password_factory, settings, headless_reverse, ): settings.ACCOUNT_RATE_LIMITS = {"change_password": "1/m/ip"} for attempt in range(2): new_password = password_factory() resp = auth_client.post( > headless_reverse("headless:account:change_password"), data={ "current_password": user_password, "new_password": new_password, }, content_type="application/json", ) allauth/headless/account/tests/test_change_password.py:210: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_verify_email_other_user[app] _______________________ auth_client = user = user_factory = .factory at 0x7f29853a99b0> headless_reverse = .rev at 0x7f29853a9a60> def test_verify_email_other_user(auth_client, user, user_factory, headless_reverse): other_user = user_factory(email_verified=False) email_address = EmailAddress.objects.get(user=other_user, verified=False) assert not email_address.verified key = EmailConfirmationHMAC(email_address).key resp = auth_client.post( > headless_reverse("headless:account:verify_email"), data={"key": key}, content_type="application/json", ) allauth/headless/account/tests/test_email_verification.py:15: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_verify_email_other_user[browser] _____________________ auth_client = user = user_factory = .factory at 0x7f298555cd50> headless_reverse = .rev at 0x7f298555d430> def test_verify_email_other_user(auth_client, user, user_factory, headless_reverse): other_user = user_factory(email_verified=False) email_address = EmailAddress.objects.get(user=other_user, verified=False) assert not email_address.verified key = EmailConfirmationHMAC(email_address).key resp = auth_client.post( > headless_reverse("headless:account:verify_email"), data={"key": key}, content_type="application/json", ) allauth/headless/account/tests/test_email_verification.py:15: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_auth_unverified_email[app] ________________________ client = user_factory = .factory at 0x7f298555d170> password_factory = .f at 0x7f298555f690> settings = headless_reverse = .rev at 0x7f298555c300> def test_auth_unverified_email( client, user_factory, password_factory, settings, headless_reverse ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" password = password_factory() user = user_factory(email_verified=False, password=password) resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": password, }, content_type="application/json", ) allauth/headless/account/tests/test_email_verification.py:34: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_auth_unverified_email[browser] ______________________ client = user_factory = .factory at 0x7f29855f1d20> password_factory = .f at 0x7f29855f1170> settings = headless_reverse = .rev at 0x7f29855f0eb0> def test_auth_unverified_email( client, user_factory, password_factory, settings, headless_reverse ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" password = password_factory() user = user_factory(email_verified=False, password=password) resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": password, }, content_type="application/json", ) allauth/headless/account/tests/test_email_verification.py:34: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_verify_email_bad_key[app] ________________________ client = settings = password_factory = .f at 0x7f29855f0bf0> user_factory = .factory at 0x7f29855f1900> headless_reverse = .rev at 0x7f29855f0b40> def test_verify_email_bad_key( client, settings, password_factory, user_factory, headless_reverse ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" password = password_factory() user = user_factory(email_verified=False, password=password) resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": password, }, content_type="application/json", ) allauth/headless/account/tests/test_email_verification.py:63: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_verify_email_bad_key[browser] ______________________ client = settings = password_factory = .f at 0x7f29855f09e0> user_factory = .factory at 0x7f2985418bf0> headless_reverse = .rev at 0x7f29854181a0> def test_verify_email_bad_key( client, settings, password_factory, user_factory, headless_reverse ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" password = password_factory() user = user_factory(email_verified=False, password=password) resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": password, }, content_type="application/json", ) allauth/headless/account/tests/test_email_verification.py:63: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_email_verification_rate_limits_login[app] ________________ client = db = None, user_password = '6ac0d269-3969-446f-93ca-3a5be2c70005' settings = user_factory = .factory at 0x7f2985419010> password_factory = .f at 0x7f298541a140> enable_cache = None headless_reverse = .rev at 0x7f29854197a0> def test_email_verification_rate_limits_login( client, db, user_password, settings, user_factory, password_factory, enable_cache, headless_reverse, ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION_BY_CODE_ENABLED = True settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_RATE_LIMITS = {"confirm_email": "1/m/key"} email = "user@email.org" user_factory(email=email, email_verified=False, password=user_password) for attempt in range(2): resp = client.post( > headless_reverse("headless:account:login"), data={ "email": email, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_email_verification_by_code.py:25: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ test_email_verification_rate_limits_login[browser] ______________ client = , db = None user_password = 'd98bb457-b0ca-4a96-ba3e-a9aa5d875027' settings = user_factory = .factory at 0x7f2984ebfc10> password_factory = .f at 0x7f2984ebf3d0> enable_cache = None headless_reverse = .rev at 0x7f2984ebc3b0> def test_email_verification_rate_limits_login( client, db, user_password, settings, user_factory, password_factory, enable_cache, headless_reverse, ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION_BY_CODE_ENABLED = True settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_RATE_LIMITS = {"confirm_email": "1/m/key"} email = "user@email.org" user_factory(email=email, email_verified=False, password=user_password) for attempt in range(2): resp = client.post( > headless_reverse("headless:account:login"), data={ "email": email, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_email_verification_by_code.py:25: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ test_email_verification_rate_limits_submitting_codes[app-GET] _________ client = db = None, user_password = 'd768519d-6bc3-43e6-be2e-4613137b1824' settings = user_factory = .factory at 0x7f29849c33d0> password_factory = .f at 0x7f29849c3b60> enable_cache = None headless_reverse = .rev at 0x7f29849c3110> method = 'GET' @pytest.mark.parametrize("method", ["GET", "POST"]) def test_email_verification_rate_limits_submitting_codes( client, db, user_password, settings, user_factory, password_factory, enable_cache, headless_reverse, method, ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION_BY_CODE_ENABLED = True settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_RATE_LIMITS = {"confirm_email": "1/m/key"} email = "user@email.org" user_factory(email=email, email_verified=False, password=user_password) resp = client.post( > headless_reverse("headless:account:login"), data={ "email": email, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_email_verification_by_code.py:70: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ test_email_verification_rate_limits_submitting_codes[app-POST] ________ client = db = None, user_password = '2cd55209-f871-4af9-b393-93850a7405c1' settings = user_factory = .factory at 0x7f29849c0bf0> password_factory = .f at 0x7f29849c0eb0> enable_cache = None headless_reverse = .rev at 0x7f29849c0300> method = 'POST' @pytest.mark.parametrize("method", ["GET", "POST"]) def test_email_verification_rate_limits_submitting_codes( client, db, user_password, settings, user_factory, password_factory, enable_cache, headless_reverse, method, ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION_BY_CODE_ENABLED = True settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_RATE_LIMITS = {"confirm_email": "1/m/key"} email = "user@email.org" user_factory(email=email, email_verified=False, password=user_password) resp = client.post( > headless_reverse("headless:account:login"), data={ "email": email, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_email_verification_by_code.py:70: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______ test_email_verification_rate_limits_submitting_codes[browser-GET] _______ client = , db = None user_password = '27c42849-1166-4290-91bf-d5cb935e90b1' settings = user_factory = .factory at 0x7f29855b7110> password_factory = .f at 0x7f29855b6b90> enable_cache = None headless_reverse = .rev at 0x7f29855b6400> method = 'GET' @pytest.mark.parametrize("method", ["GET", "POST"]) def test_email_verification_rate_limits_submitting_codes( client, db, user_password, settings, user_factory, password_factory, enable_cache, headless_reverse, method, ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION_BY_CODE_ENABLED = True settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_RATE_LIMITS = {"confirm_email": "1/m/key"} email = "user@email.org" user_factory(email=email, email_verified=False, password=user_password) resp = client.post( > headless_reverse("headless:account:login"), data={ "email": email, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_email_verification_by_code.py:70: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______ test_email_verification_rate_limits_submitting_codes[browser-POST] ______ client = , db = None user_password = 'c7fdd110-ffe3-4a58-bca4-87ee6ec2be60' settings = user_factory = .factory at 0x7f29854fafb0> password_factory = .f at 0x7f29854f85c0> enable_cache = None headless_reverse = .rev at 0x7f29854f8670> method = 'POST' @pytest.mark.parametrize("method", ["GET", "POST"]) def test_email_verification_rate_limits_submitting_codes( client, db, user_password, settings, user_factory, password_factory, enable_cache, headless_reverse, method, ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION_BY_CODE_ENABLED = True settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_RATE_LIMITS = {"confirm_email": "1/m/key"} email = "user@email.org" user_factory(email=email, email_verified=False, password=user_password) resp = client.post( > headless_reverse("headless:account:login"), data={ "email": email, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_email_verification_by_code.py:70: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_auth_password_bad_password[app] _____________________ headless_reverse = .rev at 0x7f29854fbcc0> client = user = settings = def test_auth_password_bad_password(headless_reverse, client, user, settings): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": "wrong", }, content_type="application/json", ) allauth/headless/account/tests/test_login.py:33: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_auth_password_bad_password[browser] ___________________ headless_reverse = .rev at 0x7f29849c24b0> client = user = settings = def test_auth_password_bad_password(headless_reverse, client, user, settings): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": "wrong", }, content_type="application/json", ) allauth/headless/account/tests/test_login.py:33: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_auth_password_success[app] ________________________ client = user = user_password = '941dbc08-e06c-406b-b368-3093216094ef' settings = headless_reverse = .rev at 0x7f29849c3690> headless_client = 'app' def test_auth_password_success( client, user, user_password, settings, headless_reverse, headless_client ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" login_resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_login.py:58: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_auth_password_success[browser] ______________________ client = user = user_password = 'c8e1cd96-5f8d-46f7-8a37-bcae6c83b108' settings = headless_reverse = .rev at 0x7f29851f6cf0> headless_client = 'browser' def test_auth_password_success( client, user, user_password, settings, headless_reverse, headless_client ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" login_resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_login.py:58: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_auth_password_user_inactive[app-False-401] ________________ client = user = user_password = 'a36acff7-e1e7-4aa8-b3c9-007625f7ee65' settings = status_code = 401, is_active = False headless_reverse = .rev at 0x7f29853237f0> @pytest.mark.parametrize("is_active,status_code", [(False, 401), (True, 200)]) def test_auth_password_user_inactive( client, user, user_password, settings, status_code, is_active, headless_reverse ): user.is_active = is_active user.save(update_fields=["is_active"]) resp = client.post( > headless_reverse("headless:account:login"), data={ "username": user.username, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_login.py:106: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_auth_password_user_inactive[app-True-200] ________________ client = user = user_password = '3c763dd7-9d3d-41fc-b55a-e14969b75415' settings = status_code = 200, is_active = True headless_reverse = .rev at 0x7f29855f3320> @pytest.mark.parametrize("is_active,status_code", [(False, 401), (True, 200)]) def test_auth_password_user_inactive( client, user, user_password, settings, status_code, is_active, headless_reverse ): user.is_active = is_active user.save(update_fields=["is_active"]) resp = client.post( > headless_reverse("headless:account:login"), data={ "username": user.username, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_login.py:106: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ test_auth_password_user_inactive[browser-False-401] ______________ client = user = user_password = '51d352b5-b24f-46b0-b5d8-2fcd0574df97' settings = status_code = 401, is_active = False headless_reverse = .rev at 0x7f2985177ab0> @pytest.mark.parametrize("is_active,status_code", [(False, 401), (True, 200)]) def test_auth_password_user_inactive( client, user, user_password, settings, status_code, is_active, headless_reverse ): user.is_active = is_active user.save(update_fields=["is_active"]) resp = client.post( > headless_reverse("headless:account:login"), data={ "username": user.username, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_login.py:106: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ test_auth_password_user_inactive[browser-True-200] ______________ client = user = user_password = 'aee9f389-4f88-4ed8-a7c4-dea9482ab86e' settings = status_code = 200, is_active = True headless_reverse = .rev at 0x7f2985290b40> @pytest.mark.parametrize("is_active,status_code", [(False, 401), (True, 200)]) def test_auth_password_user_inactive( client, user, user_password, settings, status_code, is_active, headless_reverse ): user.is_active = is_active user.save(update_fields=["is_active"]) resp = client.post( > headless_reverse("headless:account:login"), data={ "username": user.username, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_login.py:106: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_login_failed_rate_limit[app] _______________________ client = user = settings = headless_reverse = .rev at 0x7f298541af00> headless_client = 'app', enable_cache = None def test_login_failed_rate_limit( client, user, settings, headless_reverse, headless_client, enable_cache, ): settings.ACCOUNT_RATE_LIMITS = {"login_failed": "1/m/ip"} settings.ACCOUNT_AUTHENTICATION_METHOD = "email" for attempt in range(2): resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": "wrong", }, content_type="application/json", ) allauth/headless/account/tests/test_login.py:128: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_login_failed_rate_limit[browser] _____________________ client = user = settings = headless_reverse = .rev at 0x7f2985475850> headless_client = 'browser', enable_cache = None def test_login_failed_rate_limit( client, user, settings, headless_reverse, headless_client, enable_cache, ): settings.ACCOUNT_RATE_LIMITS = {"login_failed": "1/m/ip"} settings.ACCOUNT_AUTHENTICATION_METHOD = "email" for attempt in range(2): resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": "wrong", }, content_type="application/json", ) allauth/headless/account/tests/test_login.py:128: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_login_rate_limit[app] __________________________ client = user = user_password = '5738a654-da52-44a3-bd4b-14262cb52955' settings = headless_reverse = .rev at 0x7f29855b4e00> headless_client = 'app', enable_cache = None def test_login_rate_limit( client, user, user_password, settings, headless_reverse, headless_client, enable_cache, ): settings.ACCOUNT_RATE_LIMITS = {"login": "1/m/ip"} settings.ACCOUNT_AUTHENTICATION_METHOD = "email" for attempt in range(2): resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_login.py:165: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_login_rate_limit[browser] ________________________ client = user = user_password = 'b8be09c3-e413-49e3-a8ad-193120b12921' settings = headless_reverse = .rev at 0x7f29854fb110> headless_client = 'browser', enable_cache = None def test_login_rate_limit( client, user, user_password, settings, headless_reverse, headless_client, enable_cache, ): settings.ACCOUNT_RATE_LIMITS = {"login": "1/m/ip"} settings.ACCOUNT_AUTHENTICATION_METHOD = "email" for attempt in range(2): resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_login.py:165: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_login_already_logged_in[app] _______________________ auth_client = user = user_password = 'f1126f0e-5423-477c-a15b-5d172920c2a4' settings = headless_reverse = .rev at 0x7f298555e4b0> def test_login_already_logged_in( auth_client, user, user_password, settings, headless_reverse ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" resp = auth_client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_login.py:181: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_login_already_logged_in[browser] _____________________ auth_client = user = user_password = '23d2c5ab-a99c-4efa-aa77-535f75db0ca2' settings = headless_reverse = .rev at 0x7f29853a8460> def test_login_already_logged_in( auth_client, user, user_password, settings, headless_reverse ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" resp = auth_client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_login.py:181: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_login_by_code[app] ____________________________ headless_reverse = .rev at 0x7f29853aafb0> user = client = mailoutbox = [] def test_login_by_code(headless_reverse, user, client, mailoutbox): resp = client.post( > headless_reverse("headless:account:request_login_code"), data={"email": user.email}, content_type="application/json", ) allauth/headless/account/tests/test_login_by_code.py:9: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_login_by_code[browser] __________________________ headless_reverse = .rev at 0x7f2984949bc0> user = client = , mailoutbox = [] def test_login_by_code(headless_reverse, user, client, mailoutbox): resp = client.post( > headless_reverse("headless:account:request_login_code"), data={"email": user.email}, content_type="application/json", ) allauth/headless/account/tests/test_login_by_code.py:9: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_login_by_code_rate_limit[app] ______________________ headless_reverse = .rev at 0x7f2985176140> user = client = mailoutbox = [] settings = enable_cache = None def test_login_by_code_rate_limit( headless_reverse, user, client, mailoutbox, settings, enable_cache ): settings.ACCOUNT_RATE_LIMITS = {"request_login_code": "1/m/ip"} for attempt in range(2): resp = client.post( > headless_reverse("headless:account:request_login_code"), data={"email": user.email}, content_type="application/json", ) allauth/headless/account/tests/test_login_by_code.py:36: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_login_by_code_rate_limit[browser] ____________________ headless_reverse = .rev at 0x7f298494a560> user = client = , mailoutbox = [] settings = enable_cache = None def test_login_by_code_rate_limit( headless_reverse, user, client, mailoutbox, settings, enable_cache ): settings.ACCOUNT_RATE_LIMITS = {"request_login_code": "1/m/ip"} for attempt in range(2): resp = client.post( > headless_reverse("headless:account:request_login_code"), data={"email": user.email}, content_type="application/json", ) allauth/headless/account/tests/test_login_by_code.py:36: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_login_by_code_max_attemps[app] ______________________ headless_reverse = .rev at 0x7f298494b480> user = client = settings = def test_login_by_code_max_attemps(headless_reverse, user, client, settings): settings.ACCOUNT_LOGIN_BY_CODE_MAX_ATTEMPTS = 2 resp = client.post( > headless_reverse("headless:account:request_login_code"), data={"email": user.email}, content_type="application/json", ) allauth/headless/account/tests/test_login_by_code.py:57: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_login_by_code_max_attemps[browser] ____________________ headless_reverse = .rev at 0x7f29854fa2a0> user = client = settings = def test_login_by_code_max_attemps(headless_reverse, user, client, settings): settings.ACCOUNT_LOGIN_BY_CODE_MAX_ATTEMPTS = 2 resp = client.post( > headless_reverse("headless:account:request_login_code"), data={"email": user.email}, content_type="application/json", ) allauth/headless/account/tests/test_login_by_code.py:57: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_login_by_code_required[app] _______________________ client = settings = user_factory = .factory at 0x7f29854faf00> password_factory = .f at 0x7f29854fbe20> headless_reverse = .rev at 0x7f29854fab90> mailoutbox = [] def test_login_by_code_required( client, settings, user_factory, password_factory, headless_reverse, mailoutbox ): settings.ACCOUNT_LOGIN_BY_CODE_REQUIRED = True password = password_factory() user = user_factory(password=password, email_verified=False) email_address = EmailAddress.objects.get(email=user.email) assert not email_address.verified resp = client.post( > headless_reverse("headless:account:login"), data={ "username": user.username, "password": password, }, content_type="application/json", ) allauth/headless/account/tests/test_login_by_code.py:94: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_login_by_code_required[browser] _____________________ client = settings = user_factory = .factory at 0x7f29855c8300> password_factory = .f at 0x7f29855c8250> headless_reverse = .rev at 0x7f2984e9aae0> mailoutbox = [] def test_login_by_code_required( client, settings, user_factory, password_factory, headless_reverse, mailoutbox ): settings.ACCOUNT_LOGIN_BY_CODE_REQUIRED = True password = password_factory() user = user_factory(password=password, email_verified=False) email_address = EmailAddress.objects.get(email=user.email) assert not email_address.verified resp = client.post( > headless_reverse("headless:account:login"), data={ "username": user.username, "password": password, }, content_type="application/json", ) allauth/headless/account/tests/test_login_by_code.py:94: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_login_by_code_expired[app] ________________________ headless_reverse = .rev at 0x7f29858c8e00> user = client = mailoutbox = [] def test_login_by_code_expired(headless_reverse, user, client, mailoutbox): resp = client.post( > headless_reverse("headless:account:request_login_code"), data={"email": user.email}, content_type="application/json", ) allauth/headless/account/tests/test_login_by_code.py:121: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_login_by_code_expired[browser] ______________________ headless_reverse = .rev at 0x7f29853a9dd0> user = client = , mailoutbox = [] def test_login_by_code_expired(headless_reverse, user, client, mailoutbox): resp = client.post( > headless_reverse("headless:account:request_login_code"), data={"email": user.email}, content_type="application/json", ) allauth/headless/account/tests/test_login_by_code.py:121: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_reauthenticate[app] ___________________________ auth_client = user = user_password = '5b8f4b3a-bb19-494c-a591-a1a2ff19103e' headless_reverse = .rev at 0x7f2984ebe980> headless_client = 'app' def test_reauthenticate( auth_client, user, user_password, headless_reverse, headless_client ): resp = auth_client.get( > headless_reverse("headless:account:current_session"), content_type="application/json", ) allauth/headless/account/tests/test_reauthentication.py:5: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_reauthenticate[browser] _________________________ auth_client = user = user_password = 'f6946ff8-6e22-4755-b961-d2977a9093a5' headless_reverse = .rev at 0x7f29855b5bc0> headless_client = 'browser' def test_reauthenticate( auth_client, user, user_password, headless_reverse, headless_client ): resp = auth_client.get( > headless_reverse("headless:account:current_session"), content_type="application/json", ) allauth/headless/account/tests/test_reauthentication.py:5: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_reauthenticate_rate_limit[app] ______________________ auth_client = user = user_password = 'e2bb8643-9e10-4ab8-a7af-15020eab5601' headless_reverse = .rev at 0x7f29849c3b60> headless_client = 'app' settings = enable_cache = None def test_reauthenticate_rate_limit( auth_client, user, user_password, headless_reverse, headless_client, settings, enable_cache, ): settings.ACCOUNT_RATE_LIMITS = {"reauthenticate": "1/m/ip"} for attempt in range(4): resp = auth_client.post( > headless_reverse("headless:account:reauthenticate"), data={ "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_reauthentication.py:44: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_reauthenticate_rate_limit[browser] ____________________ auth_client = user = user_password = '3c61b66c-de99-4486-8be0-5792cd64afcf' headless_reverse = .rev at 0x7f29853207d0> headless_client = 'browser' settings = enable_cache = None def test_reauthenticate_rate_limit( auth_client, user, user_password, headless_reverse, headless_client, settings, enable_cache, ): settings.ACCOUNT_RATE_LIMITS = {"reauthenticate": "1/m/ip"} for attempt in range(4): resp = auth_client.post( > headless_reverse("headless:account:reauthenticate"), data={ "password": user_password, }, content_type="application/json", ) allauth/headless/account/tests/test_reauthentication.py:44: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_password_reset_flow[app] _________________________ client = user = , mailoutbox = [] password_factory = .f at 0x7f29848a66c0> settings = headless_reverse = .rev at 0x7f29848a5590> def test_password_reset_flow( client, user, mailoutbox, password_factory, settings, headless_reverse ): settings.ACCOUNT_EMAIL_NOTIFICATIONS = True resp = client.post( > headless_reverse("headless:account:request_password_reset"), data={ "email": user.email, }, content_type="application/json", ) allauth/headless/account/tests/test_reset_password.py:12: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_password_reset_flow[browser] _______________________ client = user = , mailoutbox = [] password_factory = .f at 0x7f29848a62a0> settings = headless_reverse = .rev at 0x7f29848a49e0> def test_password_reset_flow( client, user, mailoutbox, password_factory, settings, headless_reverse ): settings.ACCOUNT_EMAIL_NOTIFICATIONS = True resp = client.post( > headless_reverse("headless:account:request_password_reset"), data={ "email": user.email, }, content_type="application/json", ) allauth/headless/account/tests/test_reset_password.py:12: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ test_password_reset_flow_unknown_user[app] __________________ client = db = None, mailoutbox = [] password_factory = .f at 0x7f29848a5220> settings = headless_reverse = .rev at 0x7f29848a4d50> def test_password_reset_flow_unknown_user( client, db, mailoutbox, password_factory, settings, headless_reverse ): resp = client.post( > headless_reverse("headless:account:request_password_reset"), data={ "email": "not@registered.org", }, content_type="application/json", ) allauth/headless/account/tests/test_reset_password.py:101: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_password_reset_flow_unknown_user[browser] ________________ client = , db = None mailoutbox = [] password_factory = .f at 0x7f29848a5640> settings = headless_reverse = .rev at 0x7f29848a4040> def test_password_reset_flow_unknown_user( client, db, mailoutbox, password_factory, settings, headless_reverse ): resp = client.post( > headless_reverse("headless:account:request_password_reset"), data={ "email": "not@registered.org", }, content_type="application/json", ) allauth/headless/account/tests/test_reset_password.py:101: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_reset_password_rate_limit[app] ______________________ auth_client = user = headless_reverse = .rev at 0x7f2984948510> settings = enable_cache = None def test_reset_password_rate_limit( auth_client, user, headless_reverse, settings, enable_cache ): settings.ACCOUNT_RATE_LIMITS = {"reset_password": "1/m/ip"} for attempt in range(2): resp = auth_client.post( > headless_reverse("headless:account:request_password_reset"), data={"email": user.email}, content_type="application/json", ) allauth/headless/account/tests/test_reset_password.py:122: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_reset_password_rate_limit[browser] ____________________ auth_client = user = headless_reverse = .rev at 0x7f298494a350> settings = enable_cache = None def test_reset_password_rate_limit( auth_client, user, headless_reverse, settings, enable_cache ): settings.ACCOUNT_RATE_LIMITS = {"reset_password": "1/m/ip"} for attempt in range(2): resp = auth_client.post( > headless_reverse("headless:account:request_password_reset"), data={"email": user.email}, content_type="application/json", ) allauth/headless/account/tests/test_reset_password.py:122: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_password_reset_key_rate_limit[app] ____________________ client = user = settings = headless_reverse = .rev at 0x7f2984948250> password_reset_key_generator = .f at 0x7f2984949c70> enable_cache = None def test_password_reset_key_rate_limit( client, user, settings, headless_reverse, password_reset_key_generator, enable_cache, ): settings.ACCOUNT_RATE_LIMITS = {"reset_password_from_key": "1/m/ip"} for attempt in range(2): resp = client.post( > headless_reverse("headless:account:reset_password"), data={ "key": password_reset_key_generator(user), "password": "a", # too short }, content_type="application/json", ) allauth/headless/account/tests/test_reset_password.py:142: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_password_reset_key_rate_limit[browser] __________________ client = user = settings = headless_reverse = .rev at 0x7f2984a4b690> password_reset_key_generator = .f at 0x7f2984a4b7f0> enable_cache = None def test_password_reset_key_rate_limit( client, user, settings, headless_reverse, password_reset_key_generator, enable_cache, ): settings.ACCOUNT_RATE_LIMITS = {"reset_password_from_key": "1/m/ip"} for attempt in range(2): resp = client.post( > headless_reverse("headless:account:reset_password"), data={ "key": password_reset_key_generator(user), "password": "a", # too short }, content_type="application/json", ) allauth/headless/account/tests/test_reset_password.py:142: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ test_app_session_gone _____________________________ db = None, user = def test_app_session_gone(db, user): # intentionally use a vanilla Django test client client = Client() # Force login, creates a Django session client.force_login(user) # That Django session should not play any role. resp = client.get( > reverse("headless:app:account:current_session"), HTTP_X_SESSION_TOKEN="gone" ) allauth/headless/account/tests/test_session.py:12: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________________ test_logout[app] _______________________________ auth_client = headless_reverse = .rev at 0x7f29855f1590> def test_logout(auth_client, headless_reverse): # That Django session should not play any role. > resp = auth_client.get(headless_reverse("headless:account:current_session")) allauth/headless/account/tests/test_session.py:19: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ test_logout[browser] _____________________________ auth_client = headless_reverse = .rev at 0x7f29855b4880> def test_logout(auth_client, headless_reverse): # That Django session should not play any role. > resp = auth_client.get(headless_reverse("headless:account:current_session")) allauth/headless/account/tests/test_session.py:19: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ test_logout_no_token _____________________________ app_client = user = def test_logout_no_token(app_client, user): app_client.force_login(user) > resp = app_client.get(reverse("headless:app:account:current_session")) allauth/headless/account/tests/test_session.py:29: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________________ test_signup[app] _______________________________ db = None client = email_factory = .factory at 0x7f298555ceb0> password_factory = .f at 0x7f29853a8930> settings = headless_reverse = .rev at 0x7f29853aa820> headless_client = 'app' def test_signup( db, client, email_factory, password_factory, settings, headless_reverse, headless_client, ): resp = client.post( > headless_reverse("headless:account:signup"), data={ "username": "wizard", "email": email_factory(), "password": password_factory(), }, content_type="application/json", ) allauth/headless/account/tests/test_signup.py:19: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ test_signup[browser] _____________________________ db = None, client = email_factory = .factory at 0x7f29853a8a90> password_factory = .f at 0x7f29849c2cf0> settings = headless_reverse = .rev at 0x7f29849c35e0> headless_client = 'browser' def test_signup( db, client, email_factory, password_factory, settings, headless_reverse, headless_client, ): resp = client.post( > headless_reverse("headless:account:signup"), data={ "username": "wizard", "email": email_factory(), "password": password_factory(), }, content_type="application/json", ) allauth/headless/account/tests/test_signup.py:19: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_signup_with_email_verification[app] ___________________ db = None client = email_factory = .factory at 0x7f298541ba00> password_factory = .f at 0x7f29854185c0> settings = headless_reverse = .rev at 0x7f298541aa30> headless_client = 'app' def test_signup_with_email_verification( db, client, email_factory, password_factory, settings, headless_reverse, headless_client, ): settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_USERNAME_REQUIRED = False email = email_factory() resp = client.post( > headless_reverse("headless:account:signup"), data={ "email": email, "password": password_factory(), }, content_type="application/json", ) allauth/headless/account/tests/test_signup.py:44: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_signup_with_email_verification[browser] _________________ db = None, client = email_factory = .factory at 0x7f2985475f30> password_factory = .f at 0x7f2985477110> settings = headless_reverse = .rev at 0x7f2985476a30> headless_client = 'browser' def test_signup_with_email_verification( db, client, email_factory, password_factory, settings, headless_reverse, headless_client, ): settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_USERNAME_REQUIRED = False email = email_factory() resp = client.post( > headless_reverse("headless:account:signup"), data={ "email": email, "password": password_factory(), }, content_type="application/json", ) allauth/headless/account/tests/test_signup.py:44: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_signup_prevent_enumeration[app] _____________________ db = None client = email_factory = .factory at 0x7f2984a4ba00> password_factory = .f at 0x7f298631eda0> settings = headless_reverse = .rev at 0x7f29848a7ab0> headless_client = 'app', user = mailoutbox = [] def test_signup_prevent_enumeration( db, client, email_factory, password_factory, settings, headless_reverse, headless_client, user, mailoutbox, ): settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_PREVENT_ENUMERATION = True resp = client.post( > headless_reverse("headless:account:signup"), data={ "email": user.email, "password": password_factory(), }, content_type="application/json", ) allauth/headless/account/tests/test_signup.py:98: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_signup_prevent_enumeration[browser] ___________________ db = None, client = email_factory = .factory at 0x7f29848a4670> password_factory = .f at 0x7f29848a66c0> settings = headless_reverse = .rev at 0x7f29848a61f0> headless_client = 'browser', user = mailoutbox = [] def test_signup_prevent_enumeration( db, client, email_factory, password_factory, settings, headless_reverse, headless_client, user, mailoutbox, ): settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_PREVENT_ENUMERATION = True resp = client.post( > headless_reverse("headless:account:signup"), data={ "email": user.email, "password": password_factory(), }, content_type="application/json", ) allauth/headless/account/tests/test_signup.py:98: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_signup_rate_limit[app] __________________________ db = None client = email_factory = .factory at 0x7f29848a6350> password_factory = .f at 0x7f29848a78a0> settings = headless_reverse = .rev at 0x7f29848a4f60> enable_cache = None, headless_client = 'app' def test_signup_rate_limit( db, client, email_factory, password_factory, settings, headless_reverse, enable_cache, headless_client, ): settings.ACCOUNT_RATE_LIMITS = {"signup": "1/m/ip"} for attempt in range(2): resp = client.post( > headless_reverse("headless:account:signup"), data={ "username": f"wizard{attempt}", "email": email_factory(), "password": password_factory(), }, content_type="application/json", ) allauth/headless/account/tests/test_signup.py:132: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_signup_rate_limit[browser] ________________________ db = None, client = email_factory = .factory at 0x7f29848a5f30> password_factory = .f at 0x7f29848a4720> settings = headless_reverse = .rev at 0x7f29848a4510> enable_cache = None, headless_client = 'browser' def test_signup_rate_limit( db, client, email_factory, password_factory, settings, headless_reverse, enable_cache, headless_client, ): settings.ACCOUNT_RATE_LIMITS = {"signup": "1/m/ip"} for attempt in range(2): resp = client.post( > headless_reverse("headless:account:signup"), data={ "username": f"wizard{attempt}", "email": email_factory(), "password": password_factory(), }, content_type="application/json", ) allauth/headless/account/tests/test_signup.py:132: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_signup_closed[app] ____________________________ db = None client = email_factory = .factory at 0x7f2985320250> password_factory = .f at 0x7f2985323110> settings = headless_reverse = .rev at 0x7f2985323ed0> headless_client = 'app' def test_signup_closed( db, client, email_factory, password_factory, settings, headless_reverse, headless_client, ): with patch( "allauth.account.adapter.DefaultAccountAdapter.is_open_for_signup" ) as iofs: iofs.return_value = False resp = client.post( > headless_reverse("headless:account:signup"), data={ "username": "wizard", "email": email_factory(), "password": password_factory(), }, content_type="application/json", ) allauth/headless/account/tests/test_signup.py:159: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_signup_closed[browser] __________________________ db = None, client = email_factory = .factory at 0x7f29849c22a0> password_factory = .f at 0x7f29849c2560> settings = headless_reverse = .rev at 0x7f29849c0250> headless_client = 'browser' def test_signup_closed( db, client, email_factory, password_factory, settings, headless_reverse, headless_client, ): with patch( "allauth.account.adapter.DefaultAccountAdapter.is_open_for_signup" ) as iofs: iofs.return_value = False resp = client.post( > headless_reverse("headless:account:signup"), data={ "username": "wizard", "email": email_factory(), "password": password_factory(), }, content_type="application/json", ) allauth/headless/account/tests/test_signup.py:159: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_signup_while_logged_in[app] _______________________ db = None auth_client = email_factory = .factory at 0x7f29849c2610> password_factory = .f at 0x7f29849c2140> settings = headless_reverse = .rev at 0x7f29849c0670> headless_client = 'app' def test_signup_while_logged_in( db, auth_client, email_factory, password_factory, settings, headless_reverse, headless_client, ): resp = auth_client.post( > headless_reverse("headless:account:signup"), data={ "username": "wizard", "email": email_factory(), "password": password_factory(), }, content_type="application/json", ) allauth/headless/account/tests/test_signup.py:181: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_signup_while_logged_in[browser] _____________________ db = None, auth_client = email_factory = .factory at 0x7f29849c17a0> password_factory = .f at 0x7f29849c0eb0> settings = headless_reverse = .rev at 0x7f29849c3060> headless_client = 'browser' def test_signup_while_logged_in( db, auth_client, email_factory, password_factory, settings, headless_reverse, headless_client, ): resp = auth_client.post( > headless_reverse("headless:account:signup"), data={ "username": "wizard", "email": email_factory(), "password": password_factory(), }, content_type="application/json", ) allauth/headless/account/tests/test_signup.py:181: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________________ test_config[app] _______________________________ db = None client = headless_reverse = .rev at 0x7f29854194e0> def test_config(db, client, headless_reverse): > resp = client.get(headless_reverse("headless:config")) allauth/headless/base/tests/test_views.py:2: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ test_config[browser] _____________________________ db = None, client = headless_reverse = .rev at 0x7f2984ebfc10> def test_config(db, client, headless_reverse): > resp = client.get(headless_reverse("headless:config")) allauth/headless/base/tests/test_views.py:2: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_get_recovery_codes_requires_reauth[app] _________________ auth_client = user_with_recovery_codes = headless_reverse = .rev at 0x7f29853a8040> def test_get_recovery_codes_requires_reauth( auth_client, user_with_recovery_codes, headless_reverse ): rc = Authenticator.objects.get( type=Authenticator.Type.RECOVERY_CODES, user=user_with_recovery_codes ) > resp = auth_client.get(headless_reverse("headless:mfa:manage_recovery_codes")) allauth/headless/mfa/tests/test_recovery_codes.py:10: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_get_recovery_codes_requires_reauth[browser] _______________ auth_client = user_with_recovery_codes = headless_reverse = .rev at 0x7f298494a820> def test_get_recovery_codes_requires_reauth( auth_client, user_with_recovery_codes, headless_reverse ): rc = Authenticator.objects.get( type=Authenticator.Type.RECOVERY_CODES, user=user_with_recovery_codes ) > resp = auth_client.get(headless_reverse("headless:mfa:manage_recovery_codes")) allauth/headless/mfa/tests/test_recovery_codes.py:10: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_get_recovery_codes[app] _________________________ auth_client = user_with_recovery_codes = headless_reverse = .rev at 0x7f29855f31c0> reauthentication_bypass = .f at 0x7f29855f2c40> def test_get_recovery_codes( auth_client, user_with_recovery_codes, headless_reverse, reauthentication_bypass, ): with reauthentication_bypass(): > resp = auth_client.get(headless_reverse("headless:mfa:manage_recovery_codes")) allauth/headless/mfa/tests/test_recovery_codes.py:29: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_get_recovery_codes[browser] _______________________ auth_client = user_with_recovery_codes = headless_reverse = .rev at 0x7f2984944a90> reauthentication_bypass = .f at 0x7f2984946e50> def test_get_recovery_codes( auth_client, user_with_recovery_codes, headless_reverse, reauthentication_bypass, ): with reauthentication_bypass(): > resp = auth_client.get(headless_reverse("headless:mfa:manage_recovery_codes")) allauth/headless/mfa/tests/test_recovery_codes.py:29: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_generate_recovery_codes[app] _______________________ auth_client = user_with_totp = headless_reverse = .rev at 0x7f298541aae0> reauthentication_bypass = .f at 0x7f298541aa30> def test_generate_recovery_codes( auth_client, user_with_totp, headless_reverse, reauthentication_bypass, ): with reauthentication_bypass(): > resp = auth_client.get(headless_reverse("headless:mfa:manage_recovery_codes")) allauth/headless/mfa/tests/test_recovery_codes.py:50: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_generate_recovery_codes[browser] _____________________ auth_client = user_with_totp = headless_reverse = .rev at 0x7f2985476610> reauthentication_bypass = .f at 0x7f2985477740> def test_generate_recovery_codes( auth_client, user_with_totp, headless_reverse, reauthentication_bypass, ): with reauthentication_bypass(): > resp = auth_client.get(headless_reverse("headless:mfa:manage_recovery_codes")) allauth/headless/mfa/tests/test_recovery_codes.py:50: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_get_totp_not_active[app-False] ______________________ auth_client = user = headless_reverse = .rev at 0x7f2985477d70> email_verified = False @pytest.mark.parametrize("email_verified", [False, True]) def test_get_totp_not_active(auth_client, user, headless_reverse, email_verified): > resp = auth_client.get(headless_reverse("headless:mfa:manage_totp")) allauth/headless/mfa/tests/test_totp.py:8: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_get_totp_not_active[app-True] ______________________ auth_client = user = headless_reverse = .rev at 0x7f29849c3950> email_verified = True @pytest.mark.parametrize("email_verified", [False, True]) def test_get_totp_not_active(auth_client, user, headless_reverse, email_verified): > resp = auth_client.get(headless_reverse("headless:mfa:manage_totp")) allauth/headless/mfa/tests/test_totp.py:8: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_get_totp_not_active[browser-False] ____________________ auth_client = user = headless_reverse = .rev at 0x7f29853a8720> email_verified = False @pytest.mark.parametrize("email_verified", [False, True]) def test_get_totp_not_active(auth_client, user, headless_reverse, email_verified): > resp = auth_client.get(headless_reverse("headless:mfa:manage_totp")) allauth/headless/mfa/tests/test_totp.py:8: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_get_totp_not_active[browser-True] ____________________ auth_client = user = headless_reverse = .rev at 0x7f29853aa4b0> email_verified = True @pytest.mark.parametrize("email_verified", [False, True]) def test_get_totp_not_active(auth_client, user, headless_reverse, email_verified): > resp = auth_client.get(headless_reverse("headless:mfa:manage_totp")) allauth/headless/mfa/tests/test_totp.py:8: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________________ test_get_totp[app] ______________________________ auth_client = user_with_totp = headless_reverse = .rev at 0x7f29854fb270> def test_get_totp( auth_client, user_with_totp, headless_reverse, ): > resp = auth_client.get(headless_reverse("headless:mfa:manage_totp")) allauth/headless/mfa/tests/test_totp.py:32: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ test_get_totp[browser] ____________________________ auth_client = user_with_totp = headless_reverse = .rev at 0x7f29854fba00> def test_get_totp( auth_client, user_with_totp, headless_reverse, ): > resp = auth_client.get(headless_reverse("headless:mfa:manage_totp")) allauth/headless/mfa/tests/test_totp.py:32: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_deactivate_totp[app] ___________________________ auth_client = user_with_totp = headless_reverse = .rev at 0x7f298494a350> reauthentication_bypass = .f at 0x7f2984949d20> def test_deactivate_totp( auth_client, user_with_totp, headless_reverse, reauthentication_bypass, ): with reauthentication_bypass(): > resp = auth_client.delete(headless_reverse("headless:mfa:manage_totp")) allauth/headless/mfa/tests/test_totp.py:46: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_deactivate_totp[browser] _________________________ auth_client = user_with_totp = headless_reverse = .rev at 0x7f29848a50c0> reauthentication_bypass = .f at 0x7f29848a5430> def test_deactivate_totp( auth_client, user_with_totp, headless_reverse, reauthentication_bypass, ): with reauthentication_bypass(): > resp = auth_client.delete(headless_reverse("headless:mfa:manage_totp")) allauth/headless/mfa/tests/test_totp.py:46: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_activate_totp[app-False] _________________________ auth_client = user = headless_reverse = .rev at 0x7f29855f1640> reauthentication_bypass = .f at 0x7f2985290d50> settings = totp_validation_bypass = .f at 0x7f29855b4f60> email_verified = False @pytest.mark.parametrize("email_verified", [False, True]) def test_activate_totp( auth_client, user, headless_reverse, reauthentication_bypass, settings, totp_validation_bypass, email_verified, ): with reauthentication_bypass(): with totp_validation_bypass(): resp = auth_client.post( > headless_reverse("headless:mfa:manage_totp"), data={"code": "42"}, content_type="application/json", ) allauth/headless/mfa/tests/test_totp.py:64: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_activate_totp[app-True] _________________________ auth_client = user = headless_reverse = .rev at 0x7f2984944b40> reauthentication_bypass = .f at 0x7f29849464b0> settings = totp_validation_bypass = .f at 0x7f2984947480> email_verified = True @pytest.mark.parametrize("email_verified", [False, True]) def test_activate_totp( auth_client, user, headless_reverse, reauthentication_bypass, settings, totp_validation_bypass, email_verified, ): with reauthentication_bypass(): with totp_validation_bypass(): resp = auth_client.post( > headless_reverse("headless:mfa:manage_totp"), data={"code": "42"}, content_type="application/json", ) allauth/headless/mfa/tests/test_totp.py:64: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_activate_totp[browser-False] _______________________ auth_client = user = headless_reverse = .rev at 0x7f29848cde80> reauthentication_bypass = .f at 0x7f29848ceae0> settings = totp_validation_bypass = .f at 0x7f29848cefb0> email_verified = False @pytest.mark.parametrize("email_verified", [False, True]) def test_activate_totp( auth_client, user, headless_reverse, reauthentication_bypass, settings, totp_validation_bypass, email_verified, ): with reauthentication_bypass(): with totp_validation_bypass(): resp = auth_client.post( > headless_reverse("headless:mfa:manage_totp"), data={"code": "42"}, content_type="application/json", ) allauth/headless/mfa/tests/test_totp.py:64: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_activate_totp[browser-True] _______________________ auth_client = user = headless_reverse = .rev at 0x7f29846d0670> reauthentication_bypass = .f at 0x7f29846d10c0> settings = totp_validation_bypass = .f at 0x7f29846d3ed0> email_verified = True @pytest.mark.parametrize("email_verified", [False, True]) def test_activate_totp( auth_client, user, headless_reverse, reauthentication_bypass, settings, totp_validation_bypass, email_verified, ): with reauthentication_bypass(): with totp_validation_bypass(): resp = auth_client.post( > headless_reverse("headless:mfa:manage_totp"), data={"code": "42"}, content_type="application/json", ) allauth/headless/mfa/tests/test_totp.py:64: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_auth_unverified_email_and_mfa[app] ____________________ client = user_factory = .factory at 0x7f29848cc040> password_factory = .f at 0x7f29848cdb10> settings = totp_validation_bypass = .f at 0x7f29848ce770> headless_reverse = .rev at 0x7f29848ce400> headless_client = 'app' def test_auth_unverified_email_and_mfa( client, user_factory, password_factory, settings, totp_validation_bypass, headless_reverse, headless_client, ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" password = password_factory() user = user_factory(email_verified=False, password=password, with_totp=True) resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": password, }, content_type="application/json", ) allauth/headless/mfa/tests/test_views.py:19: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_auth_unverified_email_and_mfa[browser] __________________ client = user_factory = .factory at 0x7f29848cf7f0> password_factory = .f at 0x7f29848cc460> settings = totp_validation_bypass = .f at 0x7f29848cd0c0> headless_reverse = .rev at 0x7f29848cd6f0> headless_client = 'browser' def test_auth_unverified_email_and_mfa( client, user_factory, password_factory, settings, totp_validation_bypass, headless_reverse, headless_client, ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" password = password_factory() user = user_factory(email_verified=False, password=password, with_totp=True) resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": password, }, content_type="application/json", ) allauth/headless/mfa/tests/test_views.py:19: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_dangling_mfa_is_logged_out[app] _____________________ client = user_with_totp = password_factory = .f at 0x7f29849c0930> settings = totp_validation_bypass = .f at 0x7f29849c09e0> headless_reverse = .rev at 0x7f29849c16f0> headless_client = 'app', user_password = 'be4ecfbc-59f3-41c7-973f-11aae441d9f6' def test_dangling_mfa_is_logged_out( client, user_with_totp, password_factory, settings, totp_validation_bypass, headless_reverse, headless_client, user_password, ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user_with_totp.email, "password": user_password, }, content_type="application/json", ) allauth/headless/mfa/tests/test_views.py:100: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_dangling_mfa_is_logged_out[browser] ___________________ client = user_with_totp = password_factory = .f at 0x7f29849c2980> settings = totp_validation_bypass = .f at 0x7f2984944eb0> headless_reverse = .rev at 0x7f2984947740> headless_client = 'browser' user_password = 'f32eadb6-53d1-4b01-9fb5-9b3b88c8b0fd' def test_dangling_mfa_is_logged_out( client, user_with_totp, password_factory, settings, totp_validation_bypass, headless_reverse, headless_client, user_password, ): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user_with_totp.email, "password": user_password, }, content_type="application/json", ) allauth/headless/mfa/tests/test_views.py:100: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_passkey_login[app] ____________________________ client = passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f29845f3750> webauthn_authentication_bypass = .f at 0x7f2984945fe0> headless_reverse = .rev at 0x7f29849459b0> def test_passkey_login( client, passkey, webauthn_authentication_bypass, headless_reverse ): > with webauthn_authentication_bypass(passkey) as credential: allauth/headless/mfa/tests/test_webauthn.py:15: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib64/python3.14/contextlib.py:141: in __enter__ return next(self.gen) allauth/conftest.py:143: in f with patch( /usr/lib64/python3.14/unittest/mock.py:1487: in __enter__ self.target = self.getter() /usr/lib64/python3.14/pkgutil.py:463: in resolve_name mod = importlib.import_module(s) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_passkey_login[browser] __________________________ client = passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f29845bb150> webauthn_authentication_bypass = .f at 0x7f298555f950> headless_reverse = .rev at 0x7f298555e2a0> def test_passkey_login( client, passkey, webauthn_authentication_bypass, headless_reverse ): > with webauthn_authentication_bypass(passkey) as credential: allauth/headless/mfa/tests/test_webauthn.py:15: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib64/python3.14/contextlib.py:141: in __enter__ return next(self.gen) allauth/conftest.py:143: in f with patch( /usr/lib64/python3.14/unittest/mock.py:1487: in __enter__ self.target = self.getter() /usr/lib64/python3.14/pkgutil.py:463: in resolve_name mod = importlib.import_module(s) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_passkey_login_get_options[app] ______________________ client = headless_client = 'app' headless_reverse = .rev at 0x7f298555e350> db = None def test_passkey_login_get_options(client, headless_client, headless_reverse, db): > resp = client.get(headless_reverse("headless:mfa:login_webauthn")) allauth/headless/mfa/tests/test_webauthn.py:28: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_passkey_login_get_options[browser] ____________________ client = headless_client = 'browser' headless_reverse = .rev at 0x7f29855f31c0> db = None def test_passkey_login_get_options(client, headless_client, headless_reverse, db): > resp = client.get(headless_reverse("headless:mfa:login_webauthn")) allauth/headless/mfa/tests/test_webauthn.py:28: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_reauthenticate[app] ___________________________ auth_client = passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f2984626750> user_with_recovery_codes = webauthn_authentication_bypass = .f at 0x7f298494a4b0> headless_reverse = .rev at 0x7f298494b480> def test_reauthenticate( auth_client, passkey, user_with_recovery_codes, webauthn_authentication_bypass, headless_reverse, ): # View recovery codes, confirm webauthn reauthentication is an option > resp = auth_client.get(headless_reverse("headless:mfa:manage_recovery_codes")) allauth/headless/mfa/tests/test_webauthn.py:50: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_reauthenticate[browser] _________________________ auth_client = passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f29845b9ed0> user_with_recovery_codes = webauthn_authentication_bypass = .f at 0x7f29854f9220> headless_reverse = .rev at 0x7f29854f8a90> def test_reauthenticate( auth_client, passkey, user_with_recovery_codes, webauthn_authentication_bypass, headless_reverse, ): # View recovery codes, confirm webauthn reauthentication is an option > resp = auth_client.get(headless_reverse("headless:mfa:manage_recovery_codes")) allauth/headless/mfa/tests/test_webauthn.py:50: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_update_authenticator[app] ________________________ auth_client = headless_reverse = .rev at 0x7f29855c8250> passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f2984627b50> reauthentication_bypass = .f at 0x7f29848a6a30> def test_update_authenticator( auth_client, headless_reverse, passkey, reauthentication_bypass ): data = {"id": passkey.pk, "name": "Renamed!"} resp = auth_client.put( > headless_reverse("headless:mfa:manage_webauthn"), data=data, content_type="application/json", ) allauth/headless/mfa/tests/test_webauthn.py:80: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_update_authenticator[browser] ______________________ auth_client = headless_reverse = .rev at 0x7f29848a43b0> passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f2984627850> reauthentication_bypass = .f at 0x7f298541b320> def test_update_authenticator( auth_client, headless_reverse, passkey, reauthentication_bypass ): data = {"id": passkey.pk, "name": "Renamed!"} resp = auth_client.put( > headless_reverse("headless:mfa:manage_webauthn"), data=data, content_type="application/json", ) allauth/headless/mfa/tests/test_webauthn.py:80: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_delete_authenticator[app] ________________________ auth_client = headless_reverse = .rev at 0x7f298541a820> passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f29845d0dd0> reauthentication_bypass = .f at 0x7f29855b7110> def test_delete_authenticator( auth_client, headless_reverse, passkey, reauthentication_bypass ): data = {"authenticators": [passkey.pk]} resp = auth_client.delete( > headless_reverse("headless:mfa:manage_webauthn"), data=data, content_type="application/json", ) allauth/headless/mfa/tests/test_webauthn.py:102: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_delete_authenticator[browser] ______________________ auth_client = headless_reverse = .rev at 0x7f29846d37f0> passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f298466bb50> reauthentication_bypass = .f at 0x7f29846d33d0> def test_delete_authenticator( auth_client, headless_reverse, passkey, reauthentication_bypass ): data = {"authenticators": [passkey.pk]} resp = auth_client.delete( > headless_reverse("headless:mfa:manage_webauthn"), data=data, content_type="application/json", ) allauth/headless/mfa/tests/test_webauthn.py:102: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_add_authenticator[app-False] _______________________ user = auth_client = headless_reverse = .rev at 0x7f29848cd7a0> webauthn_registration_bypass = .f at 0x7f29848cefb0> reauthentication_bypass = .f at 0x7f29848ceae0> email_verified = False @pytest.mark.parametrize("email_verified", [False, True]) def test_add_authenticator( user, auth_client, headless_reverse, webauthn_registration_bypass, reauthentication_bypass, email_verified, ): > resp = auth_client.get(headless_reverse("headless:mfa:manage_webauthn")) allauth/headless/mfa/tests/test_webauthn.py:127: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_add_authenticator[app-True] _______________________ user = auth_client = headless_reverse = .rev at 0x7f29848ce4b0> webauthn_registration_bypass = .f at 0x7f29848cda60> reauthentication_bypass = .f at 0x7f29848cfab0> email_verified = True @pytest.mark.parametrize("email_verified", [False, True]) def test_add_authenticator( user, auth_client, headless_reverse, webauthn_registration_bypass, reauthentication_bypass, email_verified, ): > resp = auth_client.get(headless_reverse("headless:mfa:manage_webauthn")) allauth/headless/mfa/tests/test_webauthn.py:127: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_add_authenticator[browser-False] _____________________ user = auth_client = headless_reverse = .rev at 0x7f29848cd9b0> webauthn_registration_bypass = .f at 0x7f29848cf060> reauthentication_bypass = .f at 0x7f29855b6350> email_verified = False @pytest.mark.parametrize("email_verified", [False, True]) def test_add_authenticator( user, auth_client, headless_reverse, webauthn_registration_bypass, reauthentication_bypass, email_verified, ): > resp = auth_client.get(headless_reverse("headless:mfa:manage_webauthn")) allauth/headless/mfa/tests/test_webauthn.py:127: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_add_authenticator[browser-True] _____________________ user = auth_client = headless_reverse = .rev at 0x7f29851f5fe0> webauthn_registration_bypass = .f at 0x7f2984a4b480> reauthentication_bypass = .f at 0x7f2984a4b740> email_verified = True @pytest.mark.parametrize("email_verified", [False, True]) def test_add_authenticator( user, auth_client, headless_reverse, webauthn_registration_bypass, reauthentication_bypass, email_verified, ): > resp = auth_client.get(headless_reverse("headless:mfa:manage_webauthn")) allauth/headless/mfa/tests/test_webauthn.py:127: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ test_2fa_login[app] ______________________________ client = user = user_password = '830b5314-59f6-42c4-8419-2a9901bc9eb6' passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f29845bbdd0> webauthn_authentication_bypass = .f at 0x7f2985474880> headless_reverse = .rev at 0x7f2985474300> def test_2fa_login( client, user, user_password, passkey, webauthn_authentication_bypass, headless_reverse, ): resp = client.post( > headless_reverse("headless:account:login"), data={ "username": user.username, "password": user_password, }, content_type="application/json", ) allauth/headless/mfa/tests/test_webauthn.py:166: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_2fa_login[browser] ____________________________ client = user = user_password = 'e6c7ac4b-4750-4782-b601-5dc9bbed07aa' passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f29845b95d0> webauthn_authentication_bypass = .f at 0x7f2985477ed0> headless_reverse = .rev at 0x7f29849c07d0> def test_2fa_login( client, user, user_password, passkey, webauthn_authentication_bypass, headless_reverse, ): resp = client.post( > headless_reverse("headless:account:login"), data={ "username": user.username, "password": user_password, }, content_type="application/json", ) allauth/headless/mfa/tests/test_webauthn.py:166: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_passkey_signup[app] ___________________________ client = db = None webauthn_registration_bypass = .f at 0x7f29849c3d70> headless_reverse = .rev at 0x7f29849c10c0> def test_passkey_signup(client, db, webauthn_registration_bypass, headless_reverse): resp = client.post( > headless_reverse("headless:mfa:signup_webauthn"), data={"email": "pass@key.org", "username": "passkey"}, content_type="application/json", ) allauth/headless/mfa/tests/test_webauthn.py:202: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_passkey_signup[browser] _________________________ client = , db = None webauthn_registration_bypass = .f at 0x7f29854f89e0> headless_reverse = .rev at 0x7f29854f8300> def test_passkey_signup(client, db, webauthn_registration_bypass, headless_reverse): resp = client.post( > headless_reverse("headless:mfa:signup_webauthn"), data={"email": "pass@key.org", "username": "passkey"}, content_type="application/json", ) allauth/headless/mfa/tests/test_webauthn.py:202: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ test_bad_redirect[app] ____________________________ client = headless_reverse = .rev at 0x7f2984946400> db = None settings = def test_bad_redirect(client, headless_reverse, db, settings): settings.HEADLESS_ONLY = False resp = client.post( > headless_reverse("headless:socialaccount:redirect_to_provider"), data={ "provider": "dummy", "callback_url": "https://unsafe.org/hack", "process": AuthProcess.LOGIN, }, ) allauth/headless/socialaccount/tests/test_views.py:16: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_bad_redirect[browser] __________________________ client = headless_reverse = .rev at 0x7f29855f1590> db = None settings = def test_bad_redirect(client, headless_reverse, db, settings): settings.HEADLESS_ONLY = False resp = client.post( > headless_reverse("headless:socialaccount:redirect_to_provider"), data={ "provider": "dummy", "callback_url": "https://unsafe.org/hack", "process": AuthProcess.LOGIN, }, ) allauth/headless/socialaccount/tests/test_views.py:16: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_valid_redirect[app] ___________________________ client = headless_reverse = .rev at 0x7f29852921f0> db = None def test_valid_redirect(client, headless_reverse, db): resp = client.post( > headless_reverse("headless:socialaccount:redirect_to_provider"), data={ "provider": "dummy", "callback_url": "/", "process": AuthProcess.LOGIN, }, ) allauth/headless/socialaccount/tests/test_views.py:28: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_valid_redirect[browser] _________________________ client = headless_reverse = .rev at 0x7f29849473d0> db = None def test_valid_redirect(client, headless_reverse, db): resp = client.post( > headless_reverse("headless:socialaccount:redirect_to_provider"), data={ "provider": "dummy", "callback_url": "/", "process": AuthProcess.LOGIN, }, ) allauth/headless/socialaccount/tests/test_views.py:28: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_manage_providers[app] __________________________ auth_client = user = headless_reverse = .rev at 0x7f298494b060> provider_id = 'unittest-server' def test_manage_providers(auth_client, user, headless_reverse, provider_id): account_to_del = SocialAccount.objects.create( user=user, provider=provider_id, uid="p123" ) account_to_keep = SocialAccount.objects.create( user=user, provider=provider_id, uid="p456" ) resp = auth_client.get( > headless_reverse("headless:socialaccount:manage_providers"), ) allauth/headless/socialaccount/tests/test_views.py:46: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_manage_providers[browser] ________________________ auth_client = user = headless_reverse = .rev at 0x7f29846d1430> provider_id = 'unittest-server' def test_manage_providers(auth_client, user, headless_reverse, provider_id): account_to_del = SocialAccount.objects.create( user=user, provider=provider_id, uid="p123" ) account_to_keep = SocialAccount.objects.create( user=user, provider=provider_id, uid="p456" ) resp = auth_client.get( > headless_reverse("headless:socialaccount:manage_providers"), ) allauth/headless/socialaccount/tests/test_views.py:46: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_disconnect_bad_request[app] _______________________ auth_client = user = headless_reverse = .rev at 0x7f29846f6f00> provider_id = 'unittest-server' def test_disconnect_bad_request(auth_client, user, headless_reverse, provider_id): resp = auth_client.delete( > headless_reverse("headless:socialaccount:manage_providers"), data={"provider": provider_id, "account": "unknown"}, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:78: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_disconnect_bad_request[browser] _____________________ auth_client = user = headless_reverse = .rev at 0x7f2985419010> provider_id = 'unittest-server' def test_disconnect_bad_request(auth_client, user, headless_reverse, provider_id): resp = auth_client.delete( > headless_reverse("headless:socialaccount:manage_providers"), data={"provider": provider_id, "account": "unknown"}, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:78: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ test_valid_token[app] _____________________________ client = headless_reverse = .rev at 0x7f2985419fe0> db = None def test_valid_token(client, headless_reverse, db): id_token = json.dumps( { "id": 123, "email": "a@b.com", "email_verified": True, } ) resp = client.post( > headless_reverse("headless:socialaccount:provider_token"), data={ "provider": "dummy", "token": { "id_token": id_token, }, "process": AuthProcess.LOGIN, }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:98: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_valid_token[browser] ___________________________ client = headless_reverse = .rev at 0x7f29846d17a0> db = None def test_valid_token(client, headless_reverse, db): id_token = json.dumps( { "id": 123, "email": "a@b.com", "email_verified": True, } ) resp = client.post( > headless_reverse("headless:socialaccount:provider_token"), data={ "provider": "dummy", "token": { "id_token": id_token, }, "process": AuthProcess.LOGIN, }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:98: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_invalid_token[app] ____________________________ client = headless_reverse = .rev at 0x7f29846d38a0> db = None google_provider_settings = {'APPS': [{'client_id': 'client_id', 'secret': 'secret'}]} def test_invalid_token(client, headless_reverse, db, google_provider_settings): resp = client.post( > headless_reverse("headless:socialaccount:provider_token"), data={ "provider": "google", "token": { "id_token": "dummy", "client_id": google_provider_settings["APPS"][0]["client_id"], }, "process": AuthProcess.LOGIN, }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:114: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_invalid_token[browser] __________________________ client = headless_reverse = .rev at 0x7f29846d05c0> db = None google_provider_settings = {'APPS': [{'client_id': 'client_id', 'secret': 'secret'}]} def test_invalid_token(client, headless_reverse, db, google_provider_settings): resp = client.post( > headless_reverse("headless:socialaccount:provider_token"), data={ "provider": "google", "token": { "id_token": "dummy", "client_id": google_provider_settings["APPS"][0]["client_id"], }, "process": AuthProcess.LOGIN, }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:114: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_auth_error_no_headless_request[app] ___________________ client = db = None google_provider_settings = {'APPS': [{'client_id': 'client_id', 'secret': 'secret'}]} settings = def test_auth_error_no_headless_request(client, db, google_provider_settings, settings): """Authentication errors use the regular "Third-Party Login Failure" template if headless is not used. """ settings.HEADLESS_ONLY = False > resp = client.get(reverse("google_callback")) allauth/headless/socialaccount/tests/test_views.py:140: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_auth_error_no_headless_request[browser] _________________ client = , db = None google_provider_settings = {'APPS': [{'client_id': 'client_id', 'secret': 'secret'}]} settings = def test_auth_error_no_headless_request(client, db, google_provider_settings, settings): """Authentication errors use the regular "Third-Party Login Failure" template if headless is not used. """ settings.HEADLESS_ONLY = False > resp = client.get(reverse("google_callback")) allauth/headless/socialaccount/tests/test_views.py:140: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_auth_error_headless_request[app] _____________________ client = db = None google_provider_settings = {'APPS': [{'client_id': 'client_id', 'secret': 'secret'}]} sociallogin_setup_state = .setup at 0x7f2984946f00> def test_auth_error_headless_request( client, db, google_provider_settings, sociallogin_setup_state ): """Authentication errors redirect to the next URL with ?error params for headless requests. """ state = sociallogin_setup_state(client, headless=True, next="/foo") > resp = client.get(reverse("google_callback") + f"?state={state}") allauth/headless/socialaccount/tests/test_views.py:151: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ test_auth_error_headless_request[browser] ___________________ client = , db = None google_provider_settings = {'APPS': [{'client_id': 'client_id', 'secret': 'secret'}]} sociallogin_setup_state = .setup at 0x7f29855c8a90> def test_auth_error_headless_request( client, db, google_provider_settings, sociallogin_setup_state ): """Authentication errors redirect to the next URL with ?error params for headless requests. """ state = sociallogin_setup_state(client, headless=True, next="/foo") > resp = client.get(reverse("google_callback") + f"?state={state}") allauth/headless/socialaccount/tests/test_views.py:151: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:13: in path("accounts/", include("allauth.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/urls.py:36: in urlpatterns += [path("2fa/", include("allauth.mfa.urls"))] /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/urls.py:9: in path("", include("allauth.mfa.base.urls")) /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/base/urls.py:5: in from allauth.mfa.base import views allauth/mfa/base/views.py:13: in from allauth.mfa.stages import AuthenticateStage allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________ test_auth_error_no_headless_state_request_headless_only[app] _________ settings = client = db = None google_provider_settings = {'APPS': [{'client_id': 'client_id', 'secret': 'secret'}]} def test_auth_error_no_headless_state_request_headless_only( settings, client, db, google_provider_settings ): """Authentication errors redirect to a fallback error URL for headless-only, in case no next can be recovered from the state. """ settings.HEADLESS_ONLY = True settings.HEADLESS_FRONTEND_URLS = {"socialaccount_login_error": "/3rdparty/failure"} > resp = client.get(reverse("google_callback")) allauth/headless/socialaccount/tests/test_views.py:163: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______ test_auth_error_no_headless_state_request_headless_only[browser] _______ settings = client = , db = None google_provider_settings = {'APPS': [{'client_id': 'client_id', 'secret': 'secret'}]} def test_auth_error_no_headless_state_request_headless_only( settings, client, db, google_provider_settings ): """Authentication errors redirect to a fallback error URL for headless-only, in case no next can be recovered from the state. """ settings.HEADLESS_ONLY = True settings.HEADLESS_FRONTEND_URLS = {"socialaccount_login_error": "/3rdparty/failure"} > resp = client.get(reverse("google_callback")) allauth/headless/socialaccount/tests/test_views.py:163: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ test_auth_error_headless_state_request_headless_only[app] ___________ settings = client = db = None google_provider_settings = {'APPS': [{'client_id': 'client_id', 'secret': 'secret'}]} sociallogin_setup_state = .setup at 0x7f29846f6140> def test_auth_error_headless_state_request_headless_only( settings, client, db, google_provider_settings, sociallogin_setup_state ): """Authentication errors redirect to a fallback error URL for headless-only, in case no next can be recovered from the state. """ state = sociallogin_setup_state(client, headless=True, next="/foo") settings.HEADLESS_ONLY = True settings.HEADLESS_FRONTEND_URLS = {"socialaccount_login_error": "/3rdparty/failure"} > resp = client.get(reverse("google_callback") + f"?state={state}") allauth/headless/socialaccount/tests/test_views.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ test_auth_error_headless_state_request_headless_only[browser] _________ settings = client = , db = None google_provider_settings = {'APPS': [{'client_id': 'client_id', 'secret': 'secret'}]} sociallogin_setup_state = .setup at 0x7f298478e350> def test_auth_error_headless_state_request_headless_only( settings, client, db, google_provider_settings, sociallogin_setup_state ): """Authentication errors redirect to a fallback error URL for headless-only, in case no next can be recovered from the state. """ state = sociallogin_setup_state(client, headless=True, next="/foo") settings.HEADLESS_ONLY = True settings.HEADLESS_FRONTEND_URLS = {"socialaccount_login_error": "/3rdparty/failure"} > resp = client.get(reverse("google_callback") + f"?state={state}") allauth/headless/socialaccount/tests/test_views.py:179: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_token_signup_closed[app] _________________________ client = headless_reverse = .rev at 0x7f29845385c0> db = None def test_token_signup_closed(client, headless_reverse, db): id_token = json.dumps( { "id": 123, "email": "a@b.com", "email_verified": True, } ) with patch( "allauth.socialaccount.adapter.DefaultSocialAccountAdapter.is_open_for_signup" ) as iofs: iofs.return_value = False resp = client.post( > headless_reverse("headless:socialaccount:provider_token"), data={ "provider": "dummy", "token": { "id_token": id_token, }, "process": AuthProcess.LOGIN, }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:196: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_token_signup_closed[browser] _______________________ client = headless_reverse = .rev at 0x7f2984538b40> db = None def test_token_signup_closed(client, headless_reverse, db): id_token = json.dumps( { "id": 123, "email": "a@b.com", "email_verified": True, } ) with patch( "allauth.socialaccount.adapter.DefaultSocialAccountAdapter.is_open_for_signup" ) as iofs: iofs.return_value = False resp = client.post( > headless_reverse("headless:socialaccount:provider_token"), data={ "provider": "dummy", "token": { "id_token": id_token, }, "process": AuthProcess.LOGIN, }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:196: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_provider_signup[app] ___________________________ client = headless_reverse = .rev at 0x7f29844822a0> db = None settings = def test_provider_signup(client, headless_reverse, db, settings): settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_USERNAME_REQUIRED = False id_token = json.dumps( { "id": 123, } ) resp = client.post( > headless_reverse("headless:socialaccount:provider_token"), data={ "provider": "dummy", "token": { "id_token": id_token, }, "process": AuthProcess.LOGIN, }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:220: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ test_provider_signup[browser] _________________________ client = headless_reverse = .rev at 0x7f2984480510> db = None settings = def test_provider_signup(client, headless_reverse, db, settings): settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_USERNAME_REQUIRED = False id_token = json.dumps( { "id": 123, } ) resp = client.post( > headless_reverse("headless:socialaccount:provider_token"), data={ "provider": "dummy", "token": { "id_token": id_token, }, "process": AuthProcess.LOGIN, }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:220: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_signup_closed[app] ____________________________ client = headless_reverse = .rev at 0x7f29846f4ca0> db = None settings = def test_signup_closed(client, headless_reverse, db, settings): settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_USERNAME_REQUIRED = False id_token = json.dumps( { "id": 123, } ) resp = client.post( > headless_reverse("headless:socialaccount:provider_token"), data={ "provider": "dummy", "token": { "id_token": id_token, }, "process": AuthProcess.LOGIN, }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:256: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_signup_closed[browser] __________________________ client = headless_reverse = .rev at 0x7f29846f57a0> db = None settings = def test_signup_closed(client, headless_reverse, db, settings): settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_USERNAME_REQUIRED = False id_token = json.dumps( { "id": 123, } ) resp = client.post( > headless_reverse("headless:socialaccount:provider_token"), data={ "provider": "dummy", "token": { "id_token": id_token, }, "process": AuthProcess.LOGIN, }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:256: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________________ test_connect[app] _______________________________ user = auth_client = sociallogin_setup_state = .setup at 0x7f298541af00> headless_reverse = .rev at 0x7f2985418880> db = None def test_connect(user, auth_client, sociallogin_setup_state, headless_reverse, db): state = sociallogin_setup_state( auth_client, process="connect", next="/foo", headless=True ) resp = auth_client.post( > reverse("dummy_authenticate") + f"?state={state}", data={ "id": 123, }, ) allauth/headless/socialaccount/tests/test_views.py:288: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ test_connect[browser] _____________________________ user = auth_client = sociallogin_setup_state = .setup at 0x7f29848a5850> headless_reverse = .rev at 0x7f29848a5640> db = None def test_connect(user, auth_client, sociallogin_setup_state, headless_reverse, db): state = sociallogin_setup_state( auth_client, process="connect", next="/foo", headless=True ) resp = auth_client.post( > reverse("dummy_authenticate") + f"?state={state}", data={ "id": 123, }, ) allauth/headless/socialaccount/tests/test_views.py:288: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_connect_reauthentication_required[app] __________________ user = auth_client = sociallogin_setup_state = .setup at 0x7f2984a4a820> headless_reverse = .rev at 0x7f2984a4b530> db = None settings = def test_connect_reauthentication_required( user, auth_client, sociallogin_setup_state, headless_reverse, db, settings ): settings.ACCOUNT_REAUTHENTICATION_REQUIRED = True state = sociallogin_setup_state( auth_client, process="connect", next="/foo", headless=True ) resp = auth_client.post( > reverse("dummy_authenticate") + f"?state={state}", data={ "id": 123, }, ) allauth/headless/socialaccount/tests/test_views.py:307: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_connect_reauthentication_required[browser] ________________ user = auth_client = sociallogin_setup_state = .setup at 0x7f29849462a0> headless_reverse = .rev at 0x7f2984945a60> db = None settings = def test_connect_reauthentication_required( user, auth_client, sociallogin_setup_state, headless_reverse, db, settings ): settings.ACCOUNT_REAUTHENTICATION_REQUIRED = True state = sociallogin_setup_state( auth_client, process="connect", next="/foo", headless=True ) resp = auth_client.post( > reverse("dummy_authenticate") + f"?state={state}", data={ "id": 123, }, ) allauth/headless/socialaccount/tests/test_views.py:307: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_connect_already_connected[app] ______________________ user = user_factory = .factory at 0x7f2984948510> auth_client = sociallogin_setup_state = .setup at 0x7f2984949380> headless_reverse = .rev at 0x7f298494a400> db = None def test_connect_already_connected( user, user_factory, auth_client, sociallogin_setup_state, headless_reverse, db ): # The other user already connected the account. other_user = user_factory() SocialAccount.objects.create(user=other_user, uid="123", provider="dummy") # Then, this user tries to connect... state = sociallogin_setup_state( auth_client, process=AuthProcess.CONNECT, next="/foo", headless=True ) resp = auth_client.post( > reverse("dummy_authenticate") + f"?state={state}", data={ "id": 123, }, ) allauth/headless/socialaccount/tests/test_views.py:329: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_connect_already_connected[browser] ____________________ user = user_factory = .factory at 0x7f29848cdfe0> auth_client = sociallogin_setup_state = .setup at 0x7f298478ef00> headless_reverse = .rev at 0x7f298478c5c0> db = None def test_connect_already_connected( user, user_factory, auth_client, sociallogin_setup_state, headless_reverse, db ): # The other user already connected the account. other_user = user_factory() SocialAccount.objects.create(user=other_user, uid="123", provider="dummy") # Then, this user tries to connect... state = sociallogin_setup_state( auth_client, process=AuthProcess.CONNECT, next="/foo", headless=True ) resp = auth_client.post( > reverse("dummy_authenticate") + f"?state={state}", data={ "id": 123, }, ) allauth/headless/socialaccount/tests/test_views.py:329: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_token_connect[app] ____________________________ user = auth_client = headless_reverse = .rev at 0x7f298422c460> db = None def test_token_connect(user, auth_client, headless_reverse, db): id_token = json.dumps( { "id": 123, "email": "a@b.com", "email_verified": True, } ) resp = auth_client.post( > headless_reverse("headless:socialaccount:provider_token"), data={ "provider": "dummy", "token": { "id_token": id_token, }, "process": AuthProcess.CONNECT, }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:351: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_token_connect[browser] __________________________ user = auth_client = headless_reverse = .rev at 0x7f298422cf60> db = None def test_token_connect(user, auth_client, headless_reverse, db): id_token = json.dumps( { "id": 123, "email": "a@b.com", "email_verified": True, } ) resp = auth_client.post( > headless_reverse("headless:socialaccount:provider_token"), data={ "provider": "dummy", "token": { "id_token": id_token, }, "process": AuthProcess.CONNECT, }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:351: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ test_token_connect_already_connected[app] ___________________ user = auth_client = headless_reverse = .rev at 0x7f298422d9b0> db = None user_factory = .factory at 0x7f298422c9e0> def test_token_connect_already_connected( user, auth_client, headless_reverse, db, user_factory ): # The other user already connected the account. other_user = user_factory() SocialAccount.objects.create(user=other_user, uid="123", provider="dummy") id_token = json.dumps( { "id": 123, "email": "a@b.com", "email_verified": True, } ) resp = auth_client.post( > headless_reverse("headless:socialaccount:provider_token"), data={ "provider": "dummy", "token": { "id_token": id_token, }, "process": AuthProcess.CONNECT, }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:379: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_token_connect_already_connected[browser] _________________ user = auth_client = headless_reverse = .rev at 0x7f29849447d0> db = None user_factory = .factory at 0x7f2984947ab0> def test_token_connect_already_connected( user, auth_client, headless_reverse, db, user_factory ): # The other user already connected the account. other_user = user_factory() SocialAccount.objects.create(user=other_user, uid="123", provider="dummy") id_token = json.dumps( { "id": 123, "email": "a@b.com", "email_verified": True, } ) resp = auth_client.post( > headless_reverse("headless:socialaccount:provider_token"), data={ "provider": "dummy", "token": { "id_token": id_token, }, "process": AuthProcess.CONNECT, }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:379: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_provider_signup_not_pending[app] _____________________ client = headless_reverse = .rev at 0x7f2984944510> db = None settings = def test_provider_signup_not_pending(client, headless_reverse, db, settings): resp = client.post( > headless_reverse("headless:socialaccount:provider_signup"), data={ "email": "a@b.com", }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:404: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ test_provider_signup_not_pending[browser] ___________________ client = headless_reverse = .rev at 0x7f2984949220> db = None settings = def test_provider_signup_not_pending(client, headless_reverse, db, settings): resp = client.post( > headless_reverse("headless:socialaccount:provider_signup"), data={ "email": "a@b.com", }, content_type="application/json", ) allauth/headless/socialaccount/tests/test_views.py:404: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ test_access_token[app] ____________________________ client = user = user_password = '606016c3-70fb-403a-9112-6e9ab7ce5136' settings = headless_reverse = .rev at 0x7f29855f31c0> headless_client = 'app' def test_access_token( client, user, user_password, settings, headless_reverse, headless_client, ): settings.HEADLESS_TOKEN_STRATEGY = ( "allauth.headless.tests.test_tokens.DummyAccessTokenStrategy" ) resp = client.post( > headless_reverse("headless:account:login"), data={ "username": user.username, "password": user_password, }, content_type="application/json", ) allauth/headless/tests/test_tokens.py:21: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_access_token[browser] __________________________ client = user = user_password = 'd7e45993-8dcc-4c10-966c-b365921bc3c2' settings = headless_reverse = .rev at 0x7f29849c16f0> headless_client = 'browser' def test_access_token( client, user, user_password, settings, headless_reverse, headless_client, ): settings.HEADLESS_TOKEN_STRATEGY = ( "allauth.headless.tests.test_tokens.DummyAccessTokenStrategy" ) resp = client.post( > headless_reverse("headless:account:login"), data={ "username": user.username, "password": user_password, }, content_type="application/json", ) allauth/headless/tests/test_tokens.py:21: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________________ test_flow[app] ________________________________ client = user = user_password = 'e7066826-8068-4a38-beaa-f66832670ad7' headless_reverse = .rev at 0x7f29848a57a0> settings = def test_flow(client, user, user_password, headless_reverse, settings): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": user_password, }, content_type="application/json", ) allauth/headless/usersessions/tests/test_views.py:7: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________________ test_flow[browser] ______________________________ client = user = user_password = '74f13475-2a5f-4f62-ba89-2f55a26c13c1' headless_reverse = .rev at 0x7f29846f6da0> settings = def test_flow(client, user, user_password, headless_reverse, settings): settings.ACCOUNT_AUTHENTICATION_METHOD = "email" resp = client.post( > headless_reverse("headless:account:login"), data={ "email": user.email, "password": user_password, }, content_type="application/json", ) allauth/headless/usersessions/tests/test_views.py:7: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ test_reauthentication _____________________________ auth_client = user_with_recovery_codes = def test_reauthentication(auth_client, user_with_recovery_codes): > resp = auth_client.get(reverse("mfa_view_recovery_codes")) allauth/mfa/base/tests/test_views.py:13: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________________ test_index __________________________________ auth_client = user_with_totp = def test_index(auth_client, user_with_totp): > resp = auth_client.get(reverse("mfa_index")) allauth/mfa/base/tests/test_views.py:52: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_add_email_not_allowed __________________________ auth_client = user_with_totp = def test_add_email_not_allowed(auth_client, user_with_totp): resp = auth_client.post( > reverse("account_email"), {"action_add": "", "email": "change-to@this.org"}, ) allauth/mfa/base/tests/test_views.py:58: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ test_generate_recovery_codes_require_other_authenticator ___________ auth_client = user = settings = reauthentication_bypass = .f at 0x7f29843fae50> def test_generate_recovery_codes_require_other_authenticator( auth_client, user, settings, reauthentication_bypass ): with reauthentication_bypass(): > resp = auth_client.post(reverse("mfa_generate_recovery_codes")) allauth/mfa/recovery_codes/tests/test_views.py:16: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_download_recovery_codes _________________________ auth_client = user_with_recovery_codes = user_password = '60bd15e8-957b-4894-b347-9c214b7984ca' def test_download_recovery_codes(auth_client, user_with_recovery_codes, user_password): > resp = auth_client.get(reverse("mfa_download_recovery_codes")) allauth/mfa/recovery_codes/tests/test_views.py:26: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_view_recovery_codes ___________________________ auth_client = user_with_recovery_codes = user_password = 'fb42f576-9ad2-4673-8ac8-d713375e4410' def test_view_recovery_codes(auth_client, user_with_recovery_codes, user_password): > resp = auth_client.get(reverse("mfa_view_recovery_codes")) allauth/mfa/recovery_codes/tests/test_views.py:35: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_generate_recovery_codes _________________________ auth_client = user_with_recovery_codes = user_password = '0ecdf377-a489-41d0-8d2c-ceaa04591668' settings = mailoutbox = [] def test_generate_recovery_codes( auth_client, user_with_recovery_codes, user_password, settings, mailoutbox ): settings.ACCOUNT_EMAIL_NOTIFICATIONS = True rc = Authenticator.objects.get( user=user_with_recovery_codes, type=Authenticator.Type.RECOVERY_CODES > ).wrap() allauth/mfa/recovery_codes/tests/test_views.py:49: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/mfa/models.py:58: in wrap from allauth.mfa.webauthn.internal.auth import WebAuthn _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_recovery_codes_login ___________________________ client = user_with_totp = user_with_recovery_codes = user_password = '8ce5278d-6e89-45e8-8b60-b5e455bf4e15' def test_recovery_codes_login( client, user_with_totp, user_with_recovery_codes, user_password ): resp = client.post( > reverse("account_login"), {"login": user_with_totp.username, "password": user_password}, ) allauth/mfa/recovery_codes/tests/test_views.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_activate_totp_with_incorrect_code ____________________ auth_client = reauthentication_bypass = .f at 0x7f29841c01a0> def test_activate_totp_with_incorrect_code(auth_client, reauthentication_bypass): with reauthentication_bypass(): > resp = auth_client.get(reverse("mfa_activate_totp")) allauth/mfa/totp/tests/test_views.py:20: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ test_activate_totp_with_unverified_email[get-False] ______________ auth_client = user = totp_validation_bypass = .f at 0x7f29841c1640> reauthentication_bypass = .f at 0x7f29841c1850> method = 'get' @pytest.mark.parametrize("email_verified", [False]) @pytest.mark.parametrize("method", ["get", "post"]) def test_activate_totp_with_unverified_email( auth_client, user, totp_validation_bypass, reauthentication_bypass, method ): with reauthentication_bypass(): if method == "get": > resp = auth_client.get(reverse("mfa_activate_totp")) allauth/mfa/totp/tests/test_views.py:39: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ test_activate_totp_with_unverified_email[post-False] _____________ auth_client = user = totp_validation_bypass = .f at 0x7f2984543110> reauthentication_bypass = .f at 0x7f2984543740> method = 'post' @pytest.mark.parametrize("email_verified", [False]) @pytest.mark.parametrize("method", ["get", "post"]) def test_activate_totp_with_unverified_email( auth_client, user, totp_validation_bypass, reauthentication_bypass, method ): with reauthentication_bypass(): if method == "get": resp = auth_client.get(reverse("mfa_activate_totp")) else: > resp = auth_client.post(reverse("mfa_activate_totp"), {"code": "123"}) allauth/mfa/totp/tests/test_views.py:41: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_activate_totp_success __________________________ auth_client = totp_validation_bypass = .f at 0x7f29846f5430> user = reauthentication_bypass = .f at 0x7f298478df30> settings = mailoutbox = [] def test_activate_totp_success( auth_client, totp_validation_bypass, user, reauthentication_bypass, settings, mailoutbox, ): settings.ACCOUNT_EMAIL_NOTIFICATIONS = True with reauthentication_bypass(): > resp = auth_client.get(reverse("mfa_activate_totp")) allauth/mfa/totp/tests/test_views.py:55: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_deactivate_totp_success _________________________ auth_client = user_with_totp = user_password = 'e40fe99f-2ab3-46d8-8d25-c0093eeec417' settings = mailoutbox = [] def test_deactivate_totp_success( auth_client, user_with_totp, user_password, settings, mailoutbox ): settings.ACCOUNT_EMAIL_NOTIFICATIONS = True > resp = auth_client.get(reverse("mfa_deactivate_totp")) allauth/mfa/totp/tests/test_views.py:79: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_user_without_totp_deactivate_totp ____________________ auth_client = def test_user_without_totp_deactivate_totp(auth_client): > resp = auth_client.get(reverse("mfa_deactivate_totp")) allauth/mfa/totp/tests/test_views.py:93: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_user_with_totp_activate_totp _______________________ auth_client = user_with_totp = reauthentication_bypass = .f at 0x7f2984538300> def test_user_with_totp_activate_totp( auth_client, user_with_totp, reauthentication_bypass ): with reauthentication_bypass(): > resp = auth_client.get(reverse("mfa_activate_totp")) allauth/mfa/totp/tests/test_views.py:101: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________________ test_totp_login ________________________________ client = user_with_totp = user_password = 'a6ab3945-6c86-428e-9616-a6581ba8b747' totp_validation_bypass = .f at 0x7f29843d1a60> def test_totp_login(client, user_with_totp, user_password, totp_validation_bypass): resp = client.post( > reverse("account_login"), {"login": user_with_totp.username, "password": user_password}, ) allauth/mfa/totp/tests/test_views.py:108: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_totp_login_rate_limit __________________________ settings = enable_cache = None, user_with_totp = user_password = '96080c6c-d120-4d43-8328-5598c53efe99' client = def test_totp_login_rate_limit( settings, enable_cache, user_with_totp, user_password, client ): settings.ACCOUNT_LOGIN_ATTEMPTS_LIMIT = 3 resp = client.post( > reverse("account_login"), {"login": user_with_totp.username, "password": user_password}, ) allauth/mfa/totp/tests/test_views.py:137: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ test_cannot_deactivate_totp __________________________ auth_client = user_with_totp = user_password = '350f3659-b8be-4914-bc78-ce45ce4e2414' def test_cannot_deactivate_totp(auth_client, user_with_totp, user_password): with patch( "allauth.mfa.adapter.DefaultMFAAdapter.can_delete_authenticator" ) as cda_mock: cda_mock.return_value = False > resp = auth_client.get(reverse("mfa_deactivate_totp")) allauth/mfa/totp/tests/test_views.py:166: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ test_totp_code_reuse _____________________________ user_with_totp = user_password = 'c4000b9b-a384-4b66-a0cc-eb9527bf1dc9' totp_validation_bypass = .f at 0x7f29843d3740> enable_cache = None def test_totp_code_reuse( user_with_totp, user_password, totp_validation_bypass, enable_cache ): for code, time_lapse, expect_success in [ # First use of code, SUCCESS ("123", False, True), # Second use, no time elapsed: FAIL ("123", False, False), # Different code, no time elapsed: SUCCESS ("456", False, True), # Again, previous code, no time elapsed: FAIL ("123", False, False), # Previous code, but time elapsed: SUCCESS ("123", True, True), ]: if time_lapse: cache.clear() client = Client() resp = client.post( > reverse("account_login"), {"login": user_with_totp.username, "password": user_password}, ) allauth/mfa/totp/tests/test_views.py:203: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ test_totp_stage_expires ____________________________ client = user_with_totp = user_password = '353886b4-9bd3-4d6c-918c-f9ad74eb8fed' def test_totp_stage_expires(client, user_with_totp, user_password): resp = client.post( > reverse("account_login"), {"login": user_with_totp.username, "password": user_password}, ) allauth/mfa/totp/tests/test_views.py:227: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________________ test_passkey_login ______________________________ client = passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f29845d0050> webauthn_authentication_bypass = .f at 0x7f29845be6c0> def test_passkey_login(client, passkey, webauthn_authentication_bypass): > with webauthn_authentication_bypass(passkey) as credential: allauth/mfa/webauthn/tests/test_views.py:15: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib64/python3.14/contextlib.py:141: in __enter__ return next(self.gen) allauth/conftest.py:143: in f with patch( /usr/lib64/python3.14/unittest/mock.py:1487: in __enter__ self.target = self.getter() /usr/lib64/python3.14/pkgutil.py:463: in resolve_name mod = importlib.import_module(s) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ test_reauthenticate ______________________________ auth_client = passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f29840df650> user_with_recovery_codes = webauthn_authentication_bypass = .f at 0x7f29845beb90> def test_reauthenticate( auth_client, passkey, user_with_recovery_codes, webauthn_authentication_bypass ): > resp = auth_client.get(reverse("mfa_view_recovery_codes")) allauth/mfa/webauthn/tests/test_views.py:38: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_get_passkey_login_challenge _______________________ client = , db = None def test_get_passkey_login_challenge(client, db): resp = client.get( > reverse("mfa_login_webauthn"), HTTP_X_REQUESTED_WITH="XMLHttpRequest" ) allauth/mfa/webauthn/tests/test_views.py:62: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_invalid_passkey_login __________________________ client = passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f29842d7150> def test_invalid_passkey_login(client, passkey): > resp = client.post(reverse("mfa_login_webauthn"), data={"credential": "{}"}) allauth/mfa/webauthn/tests/test_views.py:80: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________________ test_rename_key ________________________________ auth_client = passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f29842cc750> reauthentication_bypass = .f at 0x7f29841890c0> def test_rename_key(auth_client, passkey, reauthentication_bypass): > resp = auth_client.get(reverse("mfa_edit_webauthn", kwargs={"pk": passkey.pk})) allauth/mfa/webauthn/tests/test_views.py:85: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________________ test_remove_key ________________________________ auth_client = passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f29842514d0> reauthentication_bypass = .f at 0x7f298478dd20> def test_remove_key(auth_client, passkey, reauthentication_bypass): > resp = auth_client.get(reverse("mfa_remove_webauthn", kwargs={"pk": passkey.pk})) allauth/mfa/webauthn/tests/test_views.py:101: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ test_add_key[False] ______________________________ auth_client = user = webauthn_registration_bypass = .f at 0x7f29846f4d50> reauthentication_bypass = .f at 0x7f29846f61f0> passwordless = False @pytest.mark.parametrize("passwordless", [False, True]) def test_add_key( auth_client, user, webauthn_registration_bypass, reauthentication_bypass, passwordless, ): > with webauthn_registration_bypass(user, passwordless) as credential: allauth/mfa/webauthn/tests/test_views.py:122: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib64/python3.14/contextlib.py:141: in __enter__ return next(self.gen) allauth/conftest.py:179: in f with patch( /usr/lib64/python3.14/unittest/mock.py:1487: in __enter__ self.target = self.getter() /usr/lib64/python3.14/pkgutil.py:463: in resolve_name mod = importlib.import_module(s) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________________ test_add_key[True] ______________________________ auth_client = user = webauthn_registration_bypass = .f at 0x7f29845bd2d0> reauthentication_bypass = .f at 0x7f29845bcbf0> passwordless = True @pytest.mark.parametrize("passwordless", [False, True]) def test_add_key( auth_client, user, webauthn_registration_bypass, reauthentication_bypass, passwordless, ): > with webauthn_registration_bypass(user, passwordless) as credential: allauth/mfa/webauthn/tests/test_views.py:122: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib64/python3.14/contextlib.py:141: in __enter__ return next(self.gen) allauth/conftest.py:179: in f with patch( /usr/lib64/python3.14/unittest/mock.py:1487: in __enter__ self.target = self.getter() /usr/lib64/python3.14/pkgutil.py:463: in resolve_name mod = importlib.import_module(s) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________________ test_list_keys ________________________________ auth_client = def test_list_keys(auth_client): > resp = auth_client.get(reverse("mfa_list_webauthn")) allauth/mfa/webauthn/tests/test_views.py:149: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ test_add_with_unverified_email[get-False] ___________________ auth_client = user = webauthn_registration_bypass = .f at 0x7f2984448a90> reauthentication_bypass = .f at 0x7f2984448930> method = 'get' @pytest.mark.parametrize("email_verified", [False]) @pytest.mark.parametrize("method", ["get", "post"]) def test_add_with_unverified_email( auth_client, user, webauthn_registration_bypass, reauthentication_bypass, method ): > with webauthn_registration_bypass(user, False) as credential: allauth/mfa/webauthn/tests/test_views.py:158: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib64/python3.14/contextlib.py:141: in __enter__ return next(self.gen) allauth/conftest.py:179: in f with patch( /usr/lib64/python3.14/unittest/mock.py:1487: in __enter__ self.target = self.getter() /usr/lib64/python3.14/pkgutil.py:463: in resolve_name mod = importlib.import_module(s) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ test_add_with_unverified_email[post-False] __________________ auth_client = user = webauthn_registration_bypass = .f at 0x7f298444a770> reauthentication_bypass = .f at 0x7f2984449640> method = 'post' @pytest.mark.parametrize("email_verified", [False]) @pytest.mark.parametrize("method", ["get", "post"]) def test_add_with_unverified_email( auth_client, user, webauthn_registration_bypass, reauthentication_bypass, method ): > with webauthn_registration_bypass(user, False) as credential: allauth/mfa/webauthn/tests/test_views.py:158: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib64/python3.14/contextlib.py:141: in __enter__ return next(self.gen) allauth/conftest.py:179: in f with patch( /usr/lib64/python3.14/unittest/mock.py:1487: in __enter__ self.target = self.getter() /usr/lib64/python3.14/pkgutil.py:463: in resolve_name mod = importlib.import_module(s) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ test_passkey_signup ______________________________ client = , db = None webauthn_registration_bypass = .f at 0x7f298444ab90> def test_passkey_signup(client, db, webauthn_registration_bypass): resp = client.post( > reverse("account_signup_by_passkey"), data={"email": "pass@key.org", "username": "passkey"}, ) allauth/mfa/webauthn/tests/test_views.py:170: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ test_webauthn_login ______________________________ client = user_with_passkey = passkey = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] Authenticator object at 0x7f29845d1cd0> user_password = '4063ebcb-f69f-4376-9deb-787718c57f42' webauthn_authentication_bypass = .f at 0x7f2984188f60> def test_webauthn_login( client, user_with_passkey, passkey, user_password, webauthn_authentication_bypass ): resp = client.post( > reverse("account_login"), {"login": user_with_passkey.username, "password": user_password}, ) allauth/mfa/webauthn/tests/test_views.py:188: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ AgaveTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ AgaveTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ AgaveTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ AgaveTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ AgaveTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ AgaveTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ AmazonTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ AmazonTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ AmazonTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ AmazonTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ AmazonTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ AmazonTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______ AmazonCognitoTestCase.test_account_refresh_token_saved_next_login _______ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ AmazonCognitoTestCase.test_account_tokens ___________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ AmazonCognitoTestCase.test_authentication_error ________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ AmazonCognitoTestCase.test_login _______________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ AmazonCognitoTestCase.test_login_with_pkce_disabled ______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ AmazonCognitoTestCase.test_login_with_pkce_enabled ______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _ AmazonCognitoTestCase.test_oauth2_adapter_raises_if_domain_settings_is_missing _ self = @override_settings(SOCIALACCOUNT_PROVIDERS={"amazon_cognito": {}}) def test_oauth2_adapter_raises_if_domain_settings_is_missing( self, ): mocked_response = self.get_mocked_response() with self.assertRaises( ValueError, msg=AmazonCognitoOAuth2Adapter.DOMAIN_KEY_MISSING_ERROR, ): > self.login(mocked_response) allauth/socialaccount/providers/amazon_cognito/tests.py:57: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _ AmazonCognitoTestCase.test_saves_email_as_verified_if_email_is_verified_in_cognito _ self = def test_saves_email_as_verified_if_email_is_verified_in_cognito( self, ): mocked_claims = _get_mocked_claims() mocked_claims["email_verified"] = True mocked_payload = json.dumps(mocked_claims) mocked_response = MockedResponse(status_code=200, content=mocked_payload) > self.login(mocked_response) allauth/socialaccount/providers/amazon_cognito/tests.py:67: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ AngelListTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ AngelListTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ AngelListTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ AngelListTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ AngelListTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ AngelListTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ AppleTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/providers/apple/tests.py:202: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ AppleTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/apple/tests.py:202: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ AppleTests.test_apple_finish _________________________ self = def test_apple_finish(self): > resp = self.login(self.get_mocked_response()) allauth/socialaccount/providers/apple/tests.py:245: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/apple/tests.py:202: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ AppleTests.test_authentication_error _____________________ self = def test_authentication_error(self): """Override base test because apple posts errors""" resp = self.client.post( > reverse(self.provider.id + "_callback"), data={"error": "misc", "state": "testingstate123"}, ) allauth/socialaccount/providers/apple/tests.py:231: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ AppleTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/apple/tests.py:202: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ AppleTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/apple/tests.py:202: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ AppleTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/apple/tests.py:202: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ AsanaTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ AsanaTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ AsanaTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ AsanaTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ AsanaTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ AsanaTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ AtlassianTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ AtlassianTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ AtlassianTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ AtlassianTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ AtlassianTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ AtlassianTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ Auth0Tests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ Auth0Tests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ Auth0Tests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ Auth0Tests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ Auth0Tests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ Auth0Tests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ AuthentiqTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ AuthentiqTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ AuthentiqTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ AuthentiqTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ AuthentiqTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ AuthentiqTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ BaiduTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ BaiduTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ BaiduTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ BaiduTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ BaiduTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ BaiduTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ BasecampTests.test_account_refresh_token_saved_next_login ___________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ BasecampTests.test_account_tokens _______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ BasecampTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ BasecampTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ BasecampTests.test_login_with_pkce_disabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ BasecampTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ BattleNetTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ BattleNetTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ BattleNetTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ BattleNetTests.test_extra_data ________________________ self = def test_extra_data(self): > self.login(self.get_mocked_response()) allauth/socialaccount/providers/battlenet/tests.py:64: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ BattleNetTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ BattleNetTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ BattleNetTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______ BitbucketOAuth2Tests.test_account_refresh_token_saved_next_login _______ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ BitbucketOAuth2Tests.test_account_tokens ___________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ BitbucketOAuth2Tests.test_authentication_error ________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ BitbucketOAuth2Tests.test_login ________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ BitbucketOAuth2Tests.test_login_with_pkce_disabled ______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ BitbucketOAuth2Tests.test_login_with_pkce_enabled _______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ BitbucketOAuth2Tests.test_provider_account __________________ self = def test_provider_account(self): > self.login(self.get_mocked_response()) allauth/socialaccount/providers/bitbucket_oauth2/tests.py:96: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ BitlyTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ BitlyTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ BitlyTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ BitlyTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ BitlyTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ BitlyTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ BoxOAuth2Tests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ BoxOAuth2Tests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ BoxOAuth2Tests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ BoxOAuth2Tests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ BoxOAuth2Tests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ BoxOAuth2Tests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ CILogonTests.test_account_refresh_token_saved_next_login ___________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ CILogonTests.test_account_tokens _______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ CILogonTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ CILogonTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ CILogonTests.test_login_with_pkce_disabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ CILogonTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ CleverOAuth2Tests.test_account_refresh_token_saved_next_login _________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ CleverOAuth2Tests.test_account_tokens _____________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ CleverOAuth2Tests.test_authentication_error __________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ CleverOAuth2Tests.test_login _________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ CleverOAuth2Tests.test_login_with_pkce_disabled ________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ CleverOAuth2Tests.test_login_with_pkce_enabled ________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ CoinbaseTests.test_account_refresh_token_saved_next_login ___________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ CoinbaseTests.test_account_tokens _______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ CoinbaseTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ CoinbaseTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ CoinbaseTests.test_login_with_pkce_disabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ CoinbaseTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ DataportenTest.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ DataportenTest.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ DataportenTest.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ DataportenTest.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ DataportenTest.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ DataportenTest.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ DaumTests.test_account_refresh_token_saved_next_login _____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ DaumTests.test_account_tokens _________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ DaumTests.test_authentication_error ______________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ DaumTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ DaumTests.test_login_with_pkce_disabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ DaumTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ DigitalOceanTests.test_account_refresh_token_saved_next_login _________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ DigitalOceanTests.test_account_tokens _____________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ DigitalOceanTests.test_authentication_error __________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ DigitalOceanTests.test_login _________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ DigitalOceanTests.test_login_with_pkce_disabled ________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ DigitalOceanTests.test_login_with_pkce_enabled ________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ DingTalkTests.test_account_refresh_token_saved_next_login ___________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ DingTalkTests.test_account_tokens _______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ DingTalkTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ DingTalkTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ DingTalkTests.test_login_with_pkce_disabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ DingTalkTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ DiscordTests.test_account_refresh_token_saved_next_login ___________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ DiscordTests.test_account_tokens _______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ DiscordTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ DiscordTests.test_display_name ________________________ self = multiple_login = False def test_display_name(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/providers/discord/tests.py:40: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ DiscordTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ DiscordTests.test_login_with_pkce_disabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ DiscordTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________ OldDiscordTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ OldDiscordTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ OldDiscordTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ OldDiscordTests.test_display_name _______________________ self = multiple_login = False def test_display_name(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/providers/discord/tests.py:84: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ OldDiscordTests.test_login __________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ OldDiscordTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ OldDiscordTests.test_login_with_pkce_enabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ DisqusTests.test_account_connect _______________________ self = def test_account_connect(self): email = "user@example.com" user = User.objects.create(username="user", is_active=True, email=email) user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/providers/disqus/tests.py:48: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ DisqusTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ DisqusTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ DisqusTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ DisqusTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ DisqusTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ DisqusTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ DoubanTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ DoubanTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ DoubanTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ DoubanTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ DoubanTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ DoubanTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ DoximityTests.test_account_refresh_token_saved_next_login ___________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ DoximityTests.test_account_tokens _______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ DoximityTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ DoximityTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ DoximityTests.test_login_with_pkce_disabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ DoximityTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ DraugiemTests.test_callback __________________________ self = def test_callback(self): with patch( "allauth.socialaccount.providers.draugiem.views.draugiem_complete_login" ) as draugiem_complete_login: self.mock_socialaccount_state() response_json = self.get_draugiem_login_response() token = SocialToken(app=self.app, token=response_json["apikey"]) login = self.get_socialaccount(response_json, token) draugiem_complete_login.return_value = login response = self.client.get( > reverse(views.callback), {"dr_auth_status": "ok", "dr_auth_code": "42"}, ) allauth/socialaccount/providers/draugiem/tests.py:133: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ DraugiemTests.test_callback_invalid_auth_status ________________ self = def test_callback_invalid_auth_status(self): > response = self.client.get(reverse(views.callback), {"dr_auth_status": "fail"}) allauth/socialaccount/providers/draugiem/tests.py:116: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ DraugiemTests.test_callback_no_auth_status __________________ self = def test_callback_no_auth_status(self): > response = self.client.get(reverse(views.callback)) allauth/socialaccount/providers/draugiem/tests.py:112: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ DraugiemTests.test_login_redirect _______________________ self = def test_login_redirect(self): > response = self.client.get(reverse(views.login)) allauth/socialaccount/providers/draugiem/tests.py:95: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ DripTests.test_account_refresh_token_saved_next_login _____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ DripTests.test_account_tokens _________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ DripTests.test_authentication_error ______________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ DripTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ DripTests.test_login_with_pkce_disabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ DripTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ DropboxOAuth2Tests.test_account_refresh_token_saved_next_login ________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ DropboxOAuth2Tests.test_account_tokens ____________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ DropboxOAuth2Tests.test_authentication_error _________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ DropboxOAuth2Tests.test_login _________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ DropboxOAuth2Tests.test_login_with_pkce_disabled _______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ DropboxOAuth2Tests.test_login_with_pkce_enabled ________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________________ test_login __________________________________ client = , db = None def test_login(client, db): > resp = client.post(reverse("dummy_login")) allauth/socialaccount/providers/dummy/tests.py:9: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ DwollaTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ DwollaTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ DwollaTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ DwollaTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ DwollaTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ DwollaTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ EdmodoTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ EdmodoTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ EdmodoTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ EdmodoTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ EdmodoTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ EdmodoTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ EdxTests.test_account_refresh_token_saved_next_login _____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ EdxTests.test_account_tokens _________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ EdxTests.test_authentication_error ______________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ EdxTests.test_login ______________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ EdxTests.test_login_with_pkce_disabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ EdxTests.test_login_with_pkce_enabled _____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________ EventbriteTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ EventbriteTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ EventbriteTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ EventbriteTests.test_login __________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ EventbriteTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ EventbriteTests.test_login_with_pkce_enabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ EveOnlineTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ EveOnlineTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ EveOnlineTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ EveOnlineTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ EveOnlineTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ EveOnlineTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ EvernoteTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(reverse(self.provider.id + "_callback")) allauth/socialaccount/tests/__init__.py:131: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ EvernoteTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mocks = self.get_mocked_response() if resp_mocks is None: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:67: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ ExistTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ ExistTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ ExistTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ ExistTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ ExistTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ ExistTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ FacebookTests.test_account_refresh_token_saved_next_login ___________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/facebook/provider.py:88: in get_login_url ret = super(FacebookProvider, self).get_login_url(request, **kwargs) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ FacebookTests.test_account_tokens _______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/facebook/provider.py:88: in get_login_url ret = super(FacebookProvider, self).get_login_url(request, **kwargs) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ FacebookTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ FacebookTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/facebook/provider.py:88: in get_login_url ret = super(FacebookProvider, self).get_login_url(request, **kwargs) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ FacebookTests.test_login_by_token _______________________ self = def test_login_by_token(self): > resp = self.client.get(reverse("account_login")) allauth/socialaccount/providers/facebook/tests.py:105: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ FacebookTests.test_login_by_token_reauthenticate _______________ self = @override_settings( SOCIALACCOUNT_PROVIDERS={ "facebook": { "METHOD": "js_sdk", "AUTH_PARAMS": {"auth_type": "reauthenticate"}, "VERIFIED_EMAIL": False, } } ) def test_login_by_token_reauthenticate(self): > resp = self.client.get(reverse("account_login")) allauth/socialaccount/providers/facebook/tests.py:134: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ FacebookTests.test_login_unverified ______________________ self = def test_login_unverified(self): > emailaddress = self._login_verified() allauth/socialaccount/providers/facebook/tests.py:161: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/facebook/tests.py:165: in _login_verified self.login(self.get_mocked_response()) allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/facebook/provider.py:88: in get_login_url ret = super(FacebookProvider, self).get_login_url(request, **kwargs) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ FacebookTests.test_login_verified _______________________ self = @override_settings(SOCIALACCOUNT_PROVIDERS={"facebook": {"VERIFIED_EMAIL": True}}) def test_login_verified(self): > emailaddress = self._login_verified() allauth/socialaccount/providers/facebook/tests.py:157: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/facebook/tests.py:165: in _login_verified self.login(self.get_mocked_response()) allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/facebook/provider.py:88: in get_login_url ret = super(FacebookProvider, self).get_login_url(request, **kwargs) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ FacebookTests.test_login_with_pkce_disabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/facebook/provider.py:88: in get_login_url ret = super(FacebookProvider, self).get_login_url(request, **kwargs) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ FacebookTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/facebook/provider.py:88: in get_login_url ret = super(FacebookProvider, self).get_login_url(request, **kwargs) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ FacebookTests.test_media_js __________________________ self = @override_settings( SOCIALACCOUNT_PROVIDERS={ "facebook": { "METHOD": "js_sdk", } }, ) def test_media_js(self): > request = RequestFactory().get(reverse("account_login")) allauth/socialaccount/providers/facebook/tests.py:84: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ FacebookTests.test_username_based_on_provider _________________ self = def test_username_based_on_provider(self): > self.login(self.get_mocked_response()) allauth/socialaccount/providers/facebook/tests.py:66: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/facebook/provider.py:88: in get_login_url ret = super(FacebookProvider, self).get_login_url(request, **kwargs) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ FacebookTests.test_username_based_on_provider_with_simple_name ________ self = def test_username_based_on_provider_with_simple_name(self): data = '{"id": "1234567", "name": "Harvey McGillicuddy"}' > self.login(self.get_mocked_response(data=data)) allauth/socialaccount/providers/facebook/tests.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/facebook/provider.py:88: in get_login_url ret = super(FacebookProvider, self).get_login_url(request, **kwargs) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ FacebookTests.test_username_conflict _____________________ self = def test_username_conflict(self): User = get_user_model() User.objects.create(username="raymond.penners") > self.login(self.get_mocked_response()) allauth/socialaccount/providers/facebook/tests.py:61: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/facebook/provider.py:88: in get_login_url ret = super(FacebookProvider, self).get_login_url(request, **kwargs) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ FeedlyTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ FeedlyTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ FeedlyTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ FeedlyTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ FeedlyTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ FeedlyTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ FeishuTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ FeishuTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ FeishuTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ FeishuTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ FeishuTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ FeishuTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ FigmaTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ FigmaTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ FigmaTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ FigmaTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ FigmaTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ FigmaTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ FiveHundredPxTests.test_authentication_error _________________ self = def test_authentication_error(self): > resp = self.client.get(reverse(self.provider.id + "_callback")) allauth/socialaccount/tests/__init__.py:131: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ FiveHundredPxTests.test_auto_signup ______________________ self = @override_settings( SOCIALACCOUNT_AUTO_SIGNUP=True, SOCIALACCOUNT_EMAIL_REQUIRED=False, ACCOUNT_EMAIL_REQUIRED=False, ) def test_auto_signup(self): resp_mocks = self.get_mocked_response() if not resp_mocks: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:98: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ FiveHundredPxTests.test_login _________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mocks = self.get_mocked_response() if resp_mocks is None: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:67: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ FlickrTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(reverse(self.provider.id + "_callback")) allauth/socialaccount/tests/__init__.py:131: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ FlickrTests.test_auto_signup _________________________ self = @override_settings( SOCIALACCOUNT_AUTO_SIGNUP=True, SOCIALACCOUNT_EMAIL_REQUIRED=False, ACCOUNT_EMAIL_REQUIRED=False, ) def test_auto_signup(self): resp_mocks = self.get_mocked_response() if not resp_mocks: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:98: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ FlickrTests.test_login ____________________________ self = def test_login(self): > super().test_login() allauth/socialaccount/providers/flickr/tests.py:51: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:67: in test_login resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ FlickrWithoutRealNameTests.test_authentication_error _____________ self = def test_authentication_error(self): > resp = self.client.get(reverse(self.provider.id + "_callback")) allauth/socialaccount/tests/__init__.py:131: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ FlickrWithoutRealNameTests.test_auto_signup __________________ self = @override_settings( SOCIALACCOUNT_AUTO_SIGNUP=True, SOCIALACCOUNT_EMAIL_REQUIRED=False, ACCOUNT_EMAIL_REQUIRED=False, ) def test_auto_signup(self): resp_mocks = self.get_mocked_response() if not resp_mocks: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:98: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ FlickrWithoutRealNameTests.test_login _____________________ self = def test_login(self): > super().test_login() allauth/socialaccount/providers/flickr/tests.py:108: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:67: in test_login resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________ FoursquareTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ FoursquareTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ FoursquareTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ FoursquareTests.test_login __________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ FoursquareTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ FoursquareTests.test_login_with_pkce_enabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ FrontierTests.test_account_refresh_token_saved_next_login ___________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ FrontierTests.test_account_tokens _______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ FrontierTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ FrontierTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ FrontierTests.test_login_with_pkce_disabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ FrontierTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______ FirefoxAccountsTests.test_account_refresh_token_saved_next_login _______ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ FirefoxAccountsTests.test_account_tokens ___________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ FirefoxAccountsTests.test_authentication_error ________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ FirefoxAccountsTests.test_login ________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ FirefoxAccountsTests.test_login_with_pkce_disabled ______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ FirefoxAccountsTests.test_login_with_pkce_enabled _______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ GiteaTests.test_account_name_null _______________________ self = def test_account_name_null(self): """String conversion when Gitea responds with empty username""" data = """{ "id": 4940, "login": "giteauser", "username": null }""" > self.login(MockedResponse(200, data)) allauth/socialaccount/providers/gitea/tests.py:49: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ GiteaTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ GiteaTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ GiteaTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ GiteaTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ GiteaTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ GiteaTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ GitHubTests.test_account_name_null ______________________ self = def test_account_name_null(self): """String conversion when GitHub responds with empty name""" mocks = [ MockedResponse( 200, """ { "type": "User", "id": 201022, "login": "pennersr", "name": null } """, ), MockedResponse( 200, """ [ { "email": "octocat@github.com", "verified": true, "primary": true, "visibility": "public" }, { "email": "secONDary@GitHub.COM", "verified": true, "primary": false, "visibility": "public" } ] """, ), ] with patch( "allauth.socialaccount.adapter.DefaultSocialAccountAdapter.populate_user" ) as populate_mock: > self.login(mocks) allauth/socialaccount/providers/github/tests.py:103: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ GitHubTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ GitHubTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ GitHubTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ GitHubTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ GitHubTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ GitHubTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ GitLabTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ GitLabTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ GitLabTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ GitLabTests.test_extra_data __________________________ self = def test_extra_data(self): > self.login(self.get_mocked_response()) allauth/socialaccount/providers/gitlab/tests.py:103: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ GitLabTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ GitLabTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ GitLabTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ GlobusTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ GlobusTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ GlobusTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ GlobusTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ GlobusTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ GlobusTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ GoogleTests.test_account_connect _______________________ self = def test_account_connect(self): email = "user@example.com" user = User.objects.create(username="user", is_active=True, email=email) user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") self.identity_overwrites = {"email": email, "email_verified": True} > self.login(resp_mock=None, process="connect") allauth/socialaccount/providers/google/tests.py:183: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ GoogleTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ GoogleTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ GoogleTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ GoogleTests.test_email_unverified _______________________ self = @override_settings(ACCOUNT_EMAIL_CONFIRMATION_HMAC=False) def test_email_unverified(self): self.identity_overwrites = {"email_verified": False} > resp = self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:145: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ GoogleTests.test_email_verified ________________________ self = def test_email_verified(self): self.identity_overwrites = {"email_verified": True} > self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:121: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ GoogleTests.test_email_verified_stashed ____________________ self = def test_email_verified_stashed(self): # http://slacy.com/blog/2012/01/how-to-set-session-variables-in-django-unit-tests/ engine = import_module(settings.SESSION_ENGINE) store = engine.SessionStore() store.save() self.client.cookies[settings.SESSION_COOKIE_NAME] = store.session_key request = RequestFactory().get("/") request.session = self.client.session adapter = get_account_adapter() adapter.stash_verified_email(request, self.email) request.session.save() self.identity_overwrites = {"email_verified": False} > self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:168: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ GoogleTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): > resp = self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:94: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ GoogleTests.test_social_email_verification_optional ______________ self = @override_settings( ACCOUNT_EMAIL_VERIFICATION=account_settings.EmailVerificationMethod.OPTIONAL, SOCIALACCOUNT_EMAIL_VERIFICATION=account_settings.EmailVerificationMethod.OPTIONAL, ) def test_social_email_verification_optional(self): self.identity_overwrites = {"email_verified": False} > self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:211: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ GoogleTests.test_social_email_verification_skipped ______________ self = @override_settings( ACCOUNT_EMAIL_VERIFICATION=account_settings.EmailVerificationMethod.MANDATORY, SOCIALACCOUNT_EMAIL_VERIFICATION=account_settings.EmailVerificationMethod.NONE, ) def test_social_email_verification_skipped(self): self.identity_overwrites = {"email_verified": False} > self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:198: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ GoogleTests.test_user_signed_up_signal ____________________ self = def test_user_signed_up_signal(self): sent_signals = [] def on_signed_up(sender, request, user, **kwargs): sociallogin = kwargs["sociallogin"] self.assertEqual(sociallogin.account.provider, GoogleProvider.id) self.assertEqual(sociallogin.account.user, user) sent_signals.append(sender) user_signed_up.connect(on_signed_up) > self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:139: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ GoogleTests.test_username_based_on_email ___________________ self = def test_username_based_on_email(self): self.identity_overwrites = {"given_name": "明", "family_name": "小"} > self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:115: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ GoogleTests.test_wrong_id_token_claim_values _________________ self = def test_wrong_id_token_claim_values(self): wrong_claim_values = { "iss": "not-google", "exp": time.time() - 1, "aud": "foo", } for key, value in wrong_claim_values.items(): with self.subTest(key): self.identity_overwrites = {key: value} > resp = self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:106: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ AppInSettingsTests.test_account_connect ____________________ self = def test_account_connect(self): email = "user@example.com" user = User.objects.create(username="user", is_active=True, email=email) user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") self.identity_overwrites = {"email": email, "email_verified": True} > self.login(resp_mock=None, process="connect") allauth/socialaccount/providers/google/tests.py:183: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ AppInSettingsTests.test_account_refresh_token_saved_next_login ________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ AppInSettingsTests.test_account_tokens ____________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ AppInSettingsTests.test_authentication_error _________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ AppInSettingsTests.test_email_unverified ___________________ self = @override_settings(ACCOUNT_EMAIL_CONFIRMATION_HMAC=False) def test_email_unverified(self): self.identity_overwrites = {"email_verified": False} > resp = self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:145: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ AppInSettingsTests.test_email_verified ____________________ self = def test_email_verified(self): self.identity_overwrites = {"email_verified": True} > self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:121: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ AppInSettingsTests.test_email_verified_stashed ________________ self = def test_email_verified_stashed(self): # http://slacy.com/blog/2012/01/how-to-set-session-variables-in-django-unit-tests/ engine = import_module(settings.SESSION_ENGINE) store = engine.SessionStore() store.save() self.client.cookies[settings.SESSION_COOKIE_NAME] = store.session_key request = RequestFactory().get("/") request.session = self.client.session adapter = get_account_adapter() adapter.stash_verified_email(request, self.email) request.session.save() self.identity_overwrites = {"email_verified": False} > self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:168: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ AppInSettingsTests.test_login _________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): > resp = self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:94: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ AppInSettingsTests.test_social_email_verification_optional __________ self = @override_settings( ACCOUNT_EMAIL_VERIFICATION=account_settings.EmailVerificationMethod.OPTIONAL, SOCIALACCOUNT_EMAIL_VERIFICATION=account_settings.EmailVerificationMethod.OPTIONAL, ) def test_social_email_verification_optional(self): self.identity_overwrites = {"email_verified": False} > self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:211: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ AppInSettingsTests.test_social_email_verification_skipped ___________ self = @override_settings( ACCOUNT_EMAIL_VERIFICATION=account_settings.EmailVerificationMethod.MANDATORY, SOCIALACCOUNT_EMAIL_VERIFICATION=account_settings.EmailVerificationMethod.NONE, ) def test_social_email_verification_skipped(self): self.identity_overwrites = {"email_verified": False} > self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:198: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ AppInSettingsTests.test_user_signed_up_signal _________________ self = def test_user_signed_up_signal(self): sent_signals = [] def on_signed_up(sender, request, user, **kwargs): sociallogin = kwargs["sociallogin"] self.assertEqual(sociallogin.account.provider, GoogleProvider.id) self.assertEqual(sociallogin.account.user, user) sent_signals.append(sender) user_signed_up.connect(on_signed_up) > self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:139: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ AppInSettingsTests.test_username_based_on_email ________________ self = def test_username_based_on_email(self): self.identity_overwrites = {"given_name": "明", "family_name": "小"} > self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:115: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ AppInSettingsTests.test_wrong_id_token_claim_values ______________ self = def test_wrong_id_token_claim_values(self): wrong_claim_values = { "iss": "not-google", "exp": time.time() - 1, "aud": "foo", } for key, value in wrong_claim_values.items(): with self.subTest(key): self.identity_overwrites = {key: value} > resp = self.login(resp_mock=None) allauth/socialaccount/providers/google/tests.py:106: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ test_login_by_token ______________________________ db = None, client = settings_with_google_provider = def test_login_by_token(db, client, settings_with_google_provider): client.cookies.load({"g_csrf_token": "csrf"}) with patch( "allauth.socialaccount.internal.jwtkit.jwt.get_unverified_header" ) as g_u_h: with mocked_response({"dummykid": "-----BEGIN CERTIFICATE-----"}): with patch( "allauth.socialaccount.internal.jwtkit.load_pem_x509_certificate" ) as load_pem: with patch( "allauth.socialaccount.internal.jwtkit.jwt.decode" ) as decode: decode.return_value = { "iss": "https://accounts.google.com", "aud": "client_id", "sub": "123sub", "hd": "example.com", "email": "raymond@example.com", "email_verified": True, "at_hash": "HK6E_P6Dh8Y93mRNtsDB1Q", "name": "Raymond Penners", "picture": "https://lh5.googleusercontent.com/photo.jpg", "given_name": "Raymond", "family_name": "Penners", "locale": "en", "iat": 123, "exp": 456, } g_u_h.return_value = { "alg": "RS256", "kid": "dummykid", "typ": "JWT", } pem = Mock() load_pem.return_value = pem pem.public_key.return_value = "key" resp = client.post( > reverse("google_login_by_token"), {"credential": "dummy", "g_csrf_token": "csrf"}, ) allauth/socialaccount/providers/google/tests.py:273: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ GumroadTests.test_account_refresh_token_saved_next_login ___________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ GumroadTests.test_account_tokens _______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ GumroadTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ GumroadTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ GumroadTests.test_login_with_pkce_disabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ GumroadTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ HubicTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ HubicTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ HubicTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ HubicTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ HubicTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ HubicTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ HubspotTests.test_account_refresh_token_saved_next_login ___________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ HubspotTests.test_account_tokens _______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ HubspotTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ HubspotTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ HubspotTests.test_login_with_pkce_disabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ HubspotTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ InstagramTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ InstagramTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ InstagramTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ InstagramTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ InstagramTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ InstagramTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________ JupyterHubTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ JupyterHubTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ JupyterHubTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ JupyterHubTests.test_login __________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ JupyterHubTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ JupyterHubTests.test_login_with_pkce_enabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ KakaoTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ KakaoTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ KakaoTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ KakaoTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ KakaoTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ KakaoTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ LemonLDAPTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ LemonLDAPTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ LemonLDAPTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ LemonLDAPTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ LemonLDAPTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ LemonLDAPTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ LichessTests.test_account_refresh_token_saved_next_login ___________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ LichessTests.test_account_tokens _______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ LichessTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ LichessTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ LichessTests.test_login_with_pkce_disabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ LichessTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ LineTests.test_account_refresh_token_saved_next_login _____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ LineTests.test_account_tokens _________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ LineTests.test_authentication_error ______________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ LineTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ LineTests.test_login_with_pkce_disabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ LineTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______ LinkedInOAuth2Tests.test_account_refresh_token_saved_next_login ________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ LinkedInOAuth2Tests.test_account_tokens ____________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ LinkedInOAuth2Tests.test_authentication_error _________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ LinkedInOAuth2Tests.test_login ________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ LinkedInOAuth2Tests.test_login_with_pkce_disabled _______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ LinkedInOAuth2Tests.test_login_with_pkce_enabled _______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ MailChimpTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ MailChimpTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ MailChimpTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ MailChimpTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ MailChimpTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ MailChimpTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ MailRuTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ MailRuTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ MailRuTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ MailRuTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ MailRuTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ MailRuTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ MediaWikiTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ MediaWikiTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ MediaWikiTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ MediaWikiTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ MediaWikiTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ MediaWikiTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ MeetupTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ MeetupTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ MeetupTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ MeetupTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ MeetupTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ MeetupTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______ MicrosoftGraphTests.test_account_refresh_token_saved_next_login ________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ MicrosoftGraphTests.test_account_tokens ____________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ MicrosoftGraphTests.test_authentication_error _________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ MicrosoftGraphTests.test_login ________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ MicrosoftGraphTests.test_login_with_pkce_disabled _______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ MicrosoftGraphTests.test_login_with_pkce_enabled _______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ MiroTests.test_account_refresh_token_saved_next_login _____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ MiroTests.test_account_tokens _________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ MiroTests.test_authentication_error ______________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ MiroTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ MiroTests.test_login_with_pkce_disabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ MiroTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ NaverTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ NaverTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ NaverTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ NaverTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ NaverTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ NaverTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ NetIQTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ NetIQTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ NetIQTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ NetIQTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ NetIQTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ NetIQTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ NextCloudTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ NextCloudTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ NextCloudTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ NextCloudTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ NextCloudTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ NextCloudTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ NotionTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/providers/notion/tests.py:67: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ NotionTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/notion/tests.py:67: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ NotionTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ NotionTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/notion/tests.py:67: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ NotionTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/notion/tests.py:67: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ NotionTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/notion/tests.py:67: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_samesite_strict[True-False-True] _____________________ client = samesite_strict = True settings = google_provider_settings = {'APPS': [{'client_id': 'client_id', 'secret': 'secret'}]} did_already_redirect = False, expect_redirect = True, db = None @pytest.mark.parametrize( "samesite_strict,did_already_redirect,expect_redirect", [ (True, False, True), (True, True, False), (False, False, False), ], ) def test_samesite_strict( client, samesite_strict, settings, google_provider_settings, did_already_redirect, expect_redirect, db, ): settings.SESSION_COOKIE_SAMESITE = "Strict" if samesite_strict else "Lax" query = "?state=123" resp = client.get( > reverse("google_callback") + query + ("&_redir" if did_already_redirect else "") ) allauth/socialaccount/providers/oauth2/tests/test_views.py:29: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_samesite_strict[True-True-False] _____________________ client = samesite_strict = True settings = google_provider_settings = {'APPS': [{'client_id': 'client_id', 'secret': 'secret'}]} did_already_redirect = True, expect_redirect = False, db = None @pytest.mark.parametrize( "samesite_strict,did_already_redirect,expect_redirect", [ (True, False, True), (True, True, False), (False, False, False), ], ) def test_samesite_strict( client, samesite_strict, settings, google_provider_settings, did_already_redirect, expect_redirect, db, ): settings.SESSION_COOKIE_SAMESITE = "Strict" if samesite_strict else "Lax" query = "?state=123" resp = client.get( > reverse("google_callback") + query + ("&_redir" if did_already_redirect else "") ) allauth/socialaccount/providers/oauth2/tests/test_views.py:29: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_samesite_strict[False-False-False] ____________________ client = samesite_strict = False settings = google_provider_settings = {'APPS': [{'client_id': 'client_id', 'secret': 'secret'}]} did_already_redirect = False, expect_redirect = False, db = None @pytest.mark.parametrize( "samesite_strict,did_already_redirect,expect_redirect", [ (True, False, True), (True, True, False), (False, False, False), ], ) def test_samesite_strict( client, samesite_strict, settings, google_provider_settings, did_already_redirect, expect_redirect, db, ): settings.SESSION_COOKIE_SAMESITE = "Strict" if samesite_strict else "Lax" query = "?state=123" resp = client.get( > reverse("google_callback") + query + ("&_redir" if did_already_redirect else "") ) allauth/socialaccount/providers/oauth2/tests/test_views.py:29: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ OdnoklassnikiTests.test_account_refresh_token_saved_next_login ________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ OdnoklassnikiTests.test_account_tokens ____________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ OdnoklassnikiTests.test_authentication_error _________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ OdnoklassnikiTests.test_login _________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ OdnoklassnikiTests.test_login_with_pkce_disabled _______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ OdnoklassnikiTests.test_login_with_pkce_enabled ________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ OktaTests.test_account_refresh_token_saved_next_login _____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ OktaTests.test_account_tokens _________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ OktaTests.test_authentication_error ______________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ OktaTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ OktaTests.test_login_with_pkce_disabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ OktaTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ OpenIDTests.test_discovery_failure ______________________ self = def test_discovery_failure(self): """ This used to generate a server 500: DiscoveryFailure: No usable OpenID services found for http://www.google.com/ """ resp = self.client.post( > reverse("openid_login"), dict(openid="http://www.google.com") ) allauth/socialaccount/providers/openid/tests.py:24: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______ MainOpenIDConnectTests.test_account_refresh_token_saved_next_login ______ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/openid_connect/provider.py:38: in get_login_url url = reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ MainOpenIDConnectTests.test_account_tokens __________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/openid_connect/provider.py:38: in get_login_url url = reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ MainOpenIDConnectTests.test_authentication_error _______________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/openid_connect/provider.py:46: in get_callback_url return reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ MainOpenIDConnectTests.test_login _______________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/openid_connect/provider.py:38: in get_login_url url = reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ MainOpenIDConnectTests.test_login_auto_signup _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=True) def test_login_auto_signup(self): > resp = self.login() allauth/socialaccount/tests/__init__.py:445: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/openid_connect/provider.py:38: in get_login_url url = reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ MainOpenIDConnectTests.test_login_with_pkce_disabled _____________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/openid_connect/provider.py:38: in get_login_url url = reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ MainOpenIDConnectTests.test_login_with_pkce_enabled ______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/openid_connect/provider.py:38: in get_login_url url = reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____ OtherOpenIDConnectTests.test_account_refresh_token_saved_next_login ______ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/openid_connect/provider.py:38: in get_login_url url = reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ OtherOpenIDConnectTests.test_account_tokens __________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/openid_connect/provider.py:38: in get_login_url url = reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ OtherOpenIDConnectTests.test_authentication_error _______________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/openid_connect/provider.py:46: in get_callback_url return reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ OtherOpenIDConnectTests.test_login ______________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/openid_connect/provider.py:38: in get_login_url url = reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ OtherOpenIDConnectTests.test_login_auto_signup ________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=True) def test_login_auto_signup(self): > resp = self.login() allauth/socialaccount/tests/__init__.py:445: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/openid_connect/provider.py:38: in get_login_url url = reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ OtherOpenIDConnectTests.test_login_with_pkce_disabled _____________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/openid_connect/provider.py:38: in get_login_url url = reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ OtherOpenIDConnectTests.test_login_with_pkce_enabled _____________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/openid_connect/provider.py:38: in get_login_url url = reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ OpenStreetMapTests.test_authentication_error _________________ self = def test_authentication_error(self): > resp = self.client.get(reverse(self.provider.id + "_callback")) allauth/socialaccount/tests/__init__.py:131: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ OpenStreetMapTests.test_auto_signup ______________________ self = @override_settings( SOCIALACCOUNT_AUTO_SIGNUP=True, SOCIALACCOUNT_EMAIL_REQUIRED=False, ACCOUNT_EMAIL_REQUIRED=False, ) def test_auto_signup(self): resp_mocks = self.get_mocked_response() if not resp_mocks: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:98: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ OpenStreetMapTests.test_login _________________________ self = def test_login(self): > super().test_login() allauth/socialaccount/providers/openstreetmap/tests.py:70: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:67: in test_login resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ OrcidTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ OrcidTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ OrcidTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ OrcidTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ OrcidTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ OrcidTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ PatreonTests.test_account_refresh_token_saved_next_login ___________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ PatreonTests.test_account_tokens _______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ PatreonTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ PatreonTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ PatreonTests.test_login_with_pkce_disabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ PatreonTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ PaypalTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ PaypalTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ PaypalTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ PaypalTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ PaypalTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ PaypalTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ PinterestTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ PinterestTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ PinterestTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ PinterestTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ PinterestTests.test_login_v5 _________________________ self = @override_settings( SOCIALACCOUNT_AUTO_SIGNUP=False, SOCIALACCOUNT_PROVIDERS={ "pinterest": { "API_VERSION": "v5", } }, ) def test_login_v5(self): self.provider_id = PinterestProvider.id > resp = self.login( MockedResponse( 200, """ { "account_type": "BUSINESS", "profile_image": "https://i.pinimg.com/280x280_RS/5c/88/2f/5c882f4b02468fcd6cda2ce569c2c166.jpg", "website_url": "https://sns-sdks.github.io/", "username": "enjoylifebot" } """, ), ) allauth/socialaccount/providers/pinterest/tests.py:40: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ PinterestTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ PinterestTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ PocketOAuthTests.test_authentication_error __________________ self = def test_authentication_error(self): > resp = self.client.get(reverse(self.provider.id + "_callback")) allauth/socialaccount/tests/__init__.py:131: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ PocketOAuthTests.test_login __________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mocks = self.get_mocked_response() if resp_mocks is None: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:67: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/pocket/tests.py:40: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ QuestradeTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ QuestradeTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ QuestradeTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ QuestradeTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ QuestradeTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ QuestradeTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______ QuickBooksOAuth2Tests.test_account_refresh_token_saved_next_login _______ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ QuickBooksOAuth2Tests.test_account_tokens ___________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ QuickBooksOAuth2Tests.test_authentication_error ________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ QuickBooksOAuth2Tests.test_login _______________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ QuickBooksOAuth2Tests.test_login_with_pkce_disabled ______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ QuickBooksOAuth2Tests.test_login_with_pkce_enabled ______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ RedditTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ RedditTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ RedditTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ RedditTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ RedditTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ RedditTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ RobinhoodTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ RobinhoodTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ RobinhoodTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ RobinhoodTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ RobinhoodTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ RobinhoodTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________ SalesforceTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ SalesforceTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ SalesforceTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ SalesforceTests.test_login __________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ SalesforceTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ SalesforceTests.test_login_with_pkce_enabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___ test_acs[False-adv_settings0-state_kwargs0-/not/here-/accounts/profile/] ___ request = > idp_initiated = False, db = None, saml_settings = None acs_saml_response_factory = .factory at 0x7f2983a1e090> mocked_signature_validation = None, expected_url = '/accounts/profile/' relay_state = '/not/here', state_kwargs = {'process': 'login'} sociallogin_setup_state = .setup at 0x7f2983a1c510> adv_settings = {} settings = @pytest.mark.parametrize( "idp_initiated,adv_settings,state_kwargs,relay_state, expected_url", [ (False, {}, {}, "/not/here", settings.LOGIN_REDIRECT_URL), (False, {}, {"next": "/here"}, "/not/here", "/here"), ( False, {}, {"process": "connect"}, "/not/here", reverse_lazy("socialaccount_connections"), ), (False, {}, {"process": "connect", "next": "/here"}, "/not/here", "/here"), (True, {"reject_idp_initiated_sso": False}, {}, "/set-by-idp", "/set-by-idp"), ( True, {"reject_idp_initiated_sso": False}, {}, "not-a-url", settings.LOGIN_REDIRECT_URL, ), (True, {}, {}, "/set-by-idp", "/set-by-idp"), ], ) def test_acs( request, idp_initiated, db, saml_settings, acs_saml_response_factory, mocked_signature_validation, expected_url, relay_state, state_kwargs, sociallogin_setup_state, adv_settings, settings, ): provider_settings = settings.SOCIALACCOUNT_PROVIDERS["saml"]["APPS"][0]["settings"] advanced = dict(provider_settings["advanced"]) advanced.update(adv_settings) provider_settings["advanced"] = advanced process = state_kwargs.setdefault("process", AuthProcess.LOGIN) is_connect = process == AuthProcess.CONNECT if is_connect: client = request.getfixturevalue("auth_client") user = request.getfixturevalue("user") else: client = request.getfixturevalue("client") user = None state_id = None if not idp_initiated: state_id = sociallogin_setup_state(client, **state_kwargs) data = {"SAMLResponse": acs_saml_response_factory(in_response_to=state_id)} if relay_state is not None: data["RelayState"] = relay_state resp = client.post( > reverse("saml_acs", kwargs={"organization_slug": "org"}), data=data ) allauth/socialaccount/providers/saml/tests.py:78: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________ test_acs[False-adv_settings1-state_kwargs1-/not/here-/here] __________ request = > idp_initiated = False, db = None, saml_settings = None acs_saml_response_factory = .factory at 0x7f2983a1e140> mocked_signature_validation = None, expected_url = '/here' relay_state = '/not/here', state_kwargs = {'next': '/here', 'process': 'login'} sociallogin_setup_state = .setup at 0x7f2983a1d380> adv_settings = {} settings = @pytest.mark.parametrize( "idp_initiated,adv_settings,state_kwargs,relay_state, expected_url", [ (False, {}, {}, "/not/here", settings.LOGIN_REDIRECT_URL), (False, {}, {"next": "/here"}, "/not/here", "/here"), ( False, {}, {"process": "connect"}, "/not/here", reverse_lazy("socialaccount_connections"), ), (False, {}, {"process": "connect", "next": "/here"}, "/not/here", "/here"), (True, {"reject_idp_initiated_sso": False}, {}, "/set-by-idp", "/set-by-idp"), ( True, {"reject_idp_initiated_sso": False}, {}, "not-a-url", settings.LOGIN_REDIRECT_URL, ), (True, {}, {}, "/set-by-idp", "/set-by-idp"), ], ) def test_acs( request, idp_initiated, db, saml_settings, acs_saml_response_factory, mocked_signature_validation, expected_url, relay_state, state_kwargs, sociallogin_setup_state, adv_settings, settings, ): provider_settings = settings.SOCIALACCOUNT_PROVIDERS["saml"]["APPS"][0]["settings"] advanced = dict(provider_settings["advanced"]) advanced.update(adv_settings) provider_settings["advanced"] = advanced process = state_kwargs.setdefault("process", AuthProcess.LOGIN) is_connect = process == AuthProcess.CONNECT if is_connect: client = request.getfixturevalue("auth_client") user = request.getfixturevalue("user") else: client = request.getfixturevalue("client") user = None state_id = None if not idp_initiated: state_id = sociallogin_setup_state(client, **state_kwargs) data = {"SAMLResponse": acs_saml_response_factory(in_response_to=state_id)} if relay_state is not None: data["RelayState"] = relay_state resp = client.post( > reverse("saml_acs", kwargs={"organization_slug": "org"}), data=data ) allauth/socialaccount/providers/saml/tests.py:78: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____ test_acs[False-adv_settings2-state_kwargs2-/not/here-expected_url2] ______ request = > idp_initiated = False, db = None, saml_settings = None acs_saml_response_factory = .factory at 0x7f2983a1c460> mocked_signature_validation = None expected_url = <[AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'") raised in repr()] __proxy__ object at 0x7f2985ea9350> relay_state = '/not/here', state_kwargs = {'process': 'connect'} sociallogin_setup_state = .setup at 0x7f2983a1f060> adv_settings = {} settings = @pytest.mark.parametrize( "idp_initiated,adv_settings,state_kwargs,relay_state, expected_url", [ (False, {}, {}, "/not/here", settings.LOGIN_REDIRECT_URL), (False, {}, {"next": "/here"}, "/not/here", "/here"), ( False, {}, {"process": "connect"}, "/not/here", reverse_lazy("socialaccount_connections"), ), (False, {}, {"process": "connect", "next": "/here"}, "/not/here", "/here"), (True, {"reject_idp_initiated_sso": False}, {}, "/set-by-idp", "/set-by-idp"), ( True, {"reject_idp_initiated_sso": False}, {}, "not-a-url", settings.LOGIN_REDIRECT_URL, ), (True, {}, {}, "/set-by-idp", "/set-by-idp"), ], ) def test_acs( request, idp_initiated, db, saml_settings, acs_saml_response_factory, mocked_signature_validation, expected_url, relay_state, state_kwargs, sociallogin_setup_state, adv_settings, settings, ): provider_settings = settings.SOCIALACCOUNT_PROVIDERS["saml"]["APPS"][0]["settings"] advanced = dict(provider_settings["advanced"]) advanced.update(adv_settings) provider_settings["advanced"] = advanced process = state_kwargs.setdefault("process", AuthProcess.LOGIN) is_connect = process == AuthProcess.CONNECT if is_connect: client = request.getfixturevalue("auth_client") user = request.getfixturevalue("user") else: client = request.getfixturevalue("client") user = None state_id = None if not idp_initiated: state_id = sociallogin_setup_state(client, **state_kwargs) data = {"SAMLResponse": acs_saml_response_factory(in_response_to=state_id)} if relay_state is not None: data["RelayState"] = relay_state resp = client.post( > reverse("saml_acs", kwargs={"organization_slug": "org"}), data=data ) allauth/socialaccount/providers/saml/tests.py:78: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________ test_acs[False-adv_settings3-state_kwargs3-/not/here-/here] __________ request = > idp_initiated = False, db = None, saml_settings = None acs_saml_response_factory = .factory at 0x7f2983ec8880> mocked_signature_validation = None, expected_url = '/here' relay_state = '/not/here' state_kwargs = {'next': '/here', 'process': 'connect'} sociallogin_setup_state = .setup at 0x7f2983ecb060> adv_settings = {} settings = @pytest.mark.parametrize( "idp_initiated,adv_settings,state_kwargs,relay_state, expected_url", [ (False, {}, {}, "/not/here", settings.LOGIN_REDIRECT_URL), (False, {}, {"next": "/here"}, "/not/here", "/here"), ( False, {}, {"process": "connect"}, "/not/here", reverse_lazy("socialaccount_connections"), ), (False, {}, {"process": "connect", "next": "/here"}, "/not/here", "/here"), (True, {"reject_idp_initiated_sso": False}, {}, "/set-by-idp", "/set-by-idp"), ( True, {"reject_idp_initiated_sso": False}, {}, "not-a-url", settings.LOGIN_REDIRECT_URL, ), (True, {}, {}, "/set-by-idp", "/set-by-idp"), ], ) def test_acs( request, idp_initiated, db, saml_settings, acs_saml_response_factory, mocked_signature_validation, expected_url, relay_state, state_kwargs, sociallogin_setup_state, adv_settings, settings, ): provider_settings = settings.SOCIALACCOUNT_PROVIDERS["saml"]["APPS"][0]["settings"] advanced = dict(provider_settings["advanced"]) advanced.update(adv_settings) provider_settings["advanced"] = advanced process = state_kwargs.setdefault("process", AuthProcess.LOGIN) is_connect = process == AuthProcess.CONNECT if is_connect: client = request.getfixturevalue("auth_client") user = request.getfixturevalue("user") else: client = request.getfixturevalue("client") user = None state_id = None if not idp_initiated: state_id = sociallogin_setup_state(client, **state_kwargs) data = {"SAMLResponse": acs_saml_response_factory(in_response_to=state_id)} if relay_state is not None: data["RelayState"] = relay_state resp = client.post( > reverse("saml_acs", kwargs={"organization_slug": "org"}), data=data ) allauth/socialaccount/providers/saml/tests.py:78: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______ test_acs[True-adv_settings4-state_kwargs4-/set-by-idp-/set-by-idp] ______ request = > idp_initiated = True, db = None, saml_settings = None acs_saml_response_factory = .factory at 0x7f2983cf4300> mocked_signature_validation = None, expected_url = '/set-by-idp' relay_state = '/set-by-idp', state_kwargs = {'process': 'login'} sociallogin_setup_state = .setup at 0x7f2983cf77f0> adv_settings = {'reject_idp_initiated_sso': False} settings = @pytest.mark.parametrize( "idp_initiated,adv_settings,state_kwargs,relay_state, expected_url", [ (False, {}, {}, "/not/here", settings.LOGIN_REDIRECT_URL), (False, {}, {"next": "/here"}, "/not/here", "/here"), ( False, {}, {"process": "connect"}, "/not/here", reverse_lazy("socialaccount_connections"), ), (False, {}, {"process": "connect", "next": "/here"}, "/not/here", "/here"), (True, {"reject_idp_initiated_sso": False}, {}, "/set-by-idp", "/set-by-idp"), ( True, {"reject_idp_initiated_sso": False}, {}, "not-a-url", settings.LOGIN_REDIRECT_URL, ), (True, {}, {}, "/set-by-idp", "/set-by-idp"), ], ) def test_acs( request, idp_initiated, db, saml_settings, acs_saml_response_factory, mocked_signature_validation, expected_url, relay_state, state_kwargs, sociallogin_setup_state, adv_settings, settings, ): provider_settings = settings.SOCIALACCOUNT_PROVIDERS["saml"]["APPS"][0]["settings"] advanced = dict(provider_settings["advanced"]) advanced.update(adv_settings) provider_settings["advanced"] = advanced process = state_kwargs.setdefault("process", AuthProcess.LOGIN) is_connect = process == AuthProcess.CONNECT if is_connect: client = request.getfixturevalue("auth_client") user = request.getfixturevalue("user") else: client = request.getfixturevalue("client") user = None state_id = None if not idp_initiated: state_id = sociallogin_setup_state(client, **state_kwargs) data = {"SAMLResponse": acs_saml_response_factory(in_response_to=state_id)} if relay_state is not None: data["RelayState"] = relay_state resp = client.post( > reverse("saml_acs", kwargs={"organization_slug": "org"}), data=data ) allauth/socialaccount/providers/saml/tests.py:78: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___ test_acs[True-adv_settings5-state_kwargs5-not-a-url-/accounts/profile/] ____ request = > idp_initiated = True, db = None, saml_settings = None acs_saml_response_factory = .factory at 0x7f2983cf6f00> mocked_signature_validation = None, expected_url = '/accounts/profile/' relay_state = 'not-a-url', state_kwargs = {'process': 'login'} sociallogin_setup_state = .setup at 0x7f2983cf6140> adv_settings = {'reject_idp_initiated_sso': False} settings = @pytest.mark.parametrize( "idp_initiated,adv_settings,state_kwargs,relay_state, expected_url", [ (False, {}, {}, "/not/here", settings.LOGIN_REDIRECT_URL), (False, {}, {"next": "/here"}, "/not/here", "/here"), ( False, {}, {"process": "connect"}, "/not/here", reverse_lazy("socialaccount_connections"), ), (False, {}, {"process": "connect", "next": "/here"}, "/not/here", "/here"), (True, {"reject_idp_initiated_sso": False}, {}, "/set-by-idp", "/set-by-idp"), ( True, {"reject_idp_initiated_sso": False}, {}, "not-a-url", settings.LOGIN_REDIRECT_URL, ), (True, {}, {}, "/set-by-idp", "/set-by-idp"), ], ) def test_acs( request, idp_initiated, db, saml_settings, acs_saml_response_factory, mocked_signature_validation, expected_url, relay_state, state_kwargs, sociallogin_setup_state, adv_settings, settings, ): provider_settings = settings.SOCIALACCOUNT_PROVIDERS["saml"]["APPS"][0]["settings"] advanced = dict(provider_settings["advanced"]) advanced.update(adv_settings) provider_settings["advanced"] = advanced process = state_kwargs.setdefault("process", AuthProcess.LOGIN) is_connect = process == AuthProcess.CONNECT if is_connect: client = request.getfixturevalue("auth_client") user = request.getfixturevalue("user") else: client = request.getfixturevalue("client") user = None state_id = None if not idp_initiated: state_id = sociallogin_setup_state(client, **state_kwargs) data = {"SAMLResponse": acs_saml_response_factory(in_response_to=state_id)} if relay_state is not None: data["RelayState"] = relay_state resp = client.post( > reverse("saml_acs", kwargs={"organization_slug": "org"}), data=data ) allauth/socialaccount/providers/saml/tests.py:78: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______ test_acs[True-adv_settings6-state_kwargs6-/set-by-idp-/set-by-idp] ______ request = > idp_initiated = True, db = None, saml_settings = None acs_saml_response_factory = .factory at 0x7f2983abfe20> mocked_signature_validation = None, expected_url = '/set-by-idp' relay_state = '/set-by-idp', state_kwargs = {'process': 'login'} sociallogin_setup_state = .setup at 0x7f2983abcca0> adv_settings = {} settings = @pytest.mark.parametrize( "idp_initiated,adv_settings,state_kwargs,relay_state, expected_url", [ (False, {}, {}, "/not/here", settings.LOGIN_REDIRECT_URL), (False, {}, {"next": "/here"}, "/not/here", "/here"), ( False, {}, {"process": "connect"}, "/not/here", reverse_lazy("socialaccount_connections"), ), (False, {}, {"process": "connect", "next": "/here"}, "/not/here", "/here"), (True, {"reject_idp_initiated_sso": False}, {}, "/set-by-idp", "/set-by-idp"), ( True, {"reject_idp_initiated_sso": False}, {}, "not-a-url", settings.LOGIN_REDIRECT_URL, ), (True, {}, {}, "/set-by-idp", "/set-by-idp"), ], ) def test_acs( request, idp_initiated, db, saml_settings, acs_saml_response_factory, mocked_signature_validation, expected_url, relay_state, state_kwargs, sociallogin_setup_state, adv_settings, settings, ): provider_settings = settings.SOCIALACCOUNT_PROVIDERS["saml"]["APPS"][0]["settings"] advanced = dict(provider_settings["advanced"]) advanced.update(adv_settings) provider_settings["advanced"] = advanced process = state_kwargs.setdefault("process", AuthProcess.LOGIN) is_connect = process == AuthProcess.CONNECT if is_connect: client = request.getfixturevalue("auth_client") user = request.getfixturevalue("user") else: client = request.getfixturevalue("client") user = None state_id = None if not idp_initiated: state_id = sociallogin_setup_state(client, **state_kwargs) data = {"SAMLResponse": acs_saml_response_factory(in_response_to=state_id)} if relay_state is not None: data["RelayState"] = relay_state resp = client.post( > reverse("saml_acs", kwargs={"organization_slug": "org"}), data=data ) allauth/socialaccount/providers/saml/tests.py:78: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________________ test_acs_error ________________________________ client = , db = None saml_settings = None def test_acs_error(client, db, saml_settings): data = {"SAMLResponse": "bad-response"} resp = client.post( > reverse("saml_acs", kwargs={"organization_slug": "org"}), data=data ) allauth/socialaccount/providers/saml/tests.py:101: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________________ test_acs_get _________________________________ client = , db = None saml_settings = None def test_acs_get(client, db, saml_settings): """WHile ACS expects POST, it always redirects and handles the request in the FinishACSView. """ > resp = client.get(reverse("saml_acs", kwargs={"organization_slug": "org"})) allauth/socialaccount/providers/saml/tests.py:112: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________________ test_sls_get _________________________________ client = , db = None saml_settings = None def test_sls_get(client, db, saml_settings): """SLS expects POST""" > resp = client.get(reverse("saml_sls", kwargs={"organization_slug": "org"})) allauth/socialaccount/providers/saml/tests.py:120: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________________ test_login_on_get _______________________________ client = , db = None saml_settings = None def test_login_on_get(client, db, saml_settings): > resp = client.get(reverse("saml_login", kwargs={"organization_slug": "org"})) allauth/socialaccount/providers/saml/tests.py:125: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________________ test_login __________________________________ client = , db = None saml_settings = None def test_login(client, db, saml_settings): resp = client.post( > reverse("saml_login", kwargs={"organization_slug": "org"}) + "?process=connect&next=/foo" ) allauth/socialaccount/providers/saml/tests.py:132: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________________ test_metadata _________________________________ client = , db = None saml_settings = None def test_metadata( client, db, saml_settings, ): > resp = client.get(reverse("saml_metadata", kwargs={"organization_slug": "org"})) allauth/socialaccount/providers/saml/tests.py:153: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________________ test_sls ___________________________________ auth_client = , db = None saml_settings = None user_factory = .factory at 0x7f2984382fb0> sls_saml_request = 'PGR1bW15PjwvZHVtbXk+' def test_sls(auth_client, db, saml_settings, user_factory, sls_saml_request): with patch("allauth.account.adapter.DefaultAccountAdapter.logout") as logout_mock: resp = auth_client.get( > reverse("saml_sls", kwargs={"organization_slug": "org"}) + "?" + urlencode({"SAMLRequest": sls_saml_request}) ) allauth/socialaccount/providers/saml/tests.py:163: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________ ShareFileTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ ShareFileTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ ShareFileTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ ShareFileTests.test_login ___________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ ShareFileTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ ShareFileTests.test_login_with_pkce_enabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ ShopifyTests.test_account_refresh_token_saved_next_login ___________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/providers/shopify/tests.py:40: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ ShopifyTests.test_account_tokens _______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/shopify/tests.py:40: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ ShopifyTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ ShopifyTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/shopify/tests.py:40: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ ShopifyTests.test_login_with_pkce_disabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/shopify/tests.py:40: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ ShopifyTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/shopify/tests.py:40: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______ ShopifyEmbeddedTests.test_account_refresh_token_saved_next_login _______ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/providers/shopify/tests.py:81: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ ShopifyEmbeddedTests.test_account_tokens ___________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/shopify/tests.py:81: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ ShopifyEmbeddedTests.test_authentication_error ________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ ShopifyEmbeddedTests.test_login ________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/shopify/tests.py:81: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ ShopifyEmbeddedTests.test_login_with_pkce_disabled ______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/shopify/tests.py:81: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ ShopifyEmbeddedTests.test_login_with_pkce_enabled _______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/shopify/tests.py:81: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____ ShopifyPerUserAccessTests.test_account_refresh_token_saved_next_login _____ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/providers/shopify/tests.py:40: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ ShopifyPerUserAccessTests.test_account_tokens _________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/shopify/tests.py:40: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ ShopifyPerUserAccessTests.test_associated_user ________________ self = @override_settings( SOCIALACCOUNT_AUTO_SIGNUP=True, SOCIALACCOUNT_EMAIL_REQUIRED=True, ACCOUNT_EMAIL_REQUIRED=True, ) def test_associated_user(self): resp_mocks = self.get_mocked_response() > resp = self.login(resp_mocks) allauth/socialaccount/providers/shopify/tests.py:150: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/shopify/tests.py:40: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ ShopifyPerUserAccessTests.test_authentication_error ______________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ ShopifyPerUserAccessTests.test_login _____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/shopify/tests.py:40: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ ShopifyPerUserAccessTests.test_login_with_pkce_disabled ____________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/shopify/tests.py:40: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ ShopifyPerUserAccessTests.test_login_with_pkce_enabled ____________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/shopify/tests.py:40: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________ SlackOAuth2Tests.test_account_refresh_token_saved_next_login _________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ SlackOAuth2Tests.test_account_tokens _____________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ SlackOAuth2Tests.test_authentication_error __________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ SlackOAuth2Tests.test_login __________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ SlackOAuth2Tests.test_login_with_pkce_disabled ________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ SlackOAuth2Tests.test_login_with_pkce_enabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______ SnapchatOAuth2Tests.test_account_refresh_token_saved_next_login ________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ SnapchatOAuth2Tests.test_account_tokens ____________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ SnapchatOAuth2Tests.test_authentication_error _________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ SnapchatOAuth2Tests.test_login ________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ SnapchatOAuth2Tests.test_login_with_pkce_disabled _______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ SnapchatOAuth2Tests.test_login_with_pkce_enabled _______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________ SoundCloudTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ SoundCloudTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ SoundCloudTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ SoundCloudTests.test_login __________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ SoundCloudTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ SoundCloudTests.test_login_with_pkce_enabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ SpotifyOAuth2Tests.test_account_refresh_token_saved_next_login ________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ SpotifyOAuth2Tests.test_account_tokens ____________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ SpotifyOAuth2Tests.test_authentication_error _________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ SpotifyOAuth2Tests.test_login _________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ SpotifyOAuth2Tests.test_login_with_pkce_disabled _______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ SpotifyOAuth2Tests.test_login_with_pkce_enabled ________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ StackExchangeTests.test_account_refresh_token_saved_next_login ________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ StackExchangeTests.test_account_tokens ____________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ StackExchangeTests.test_authentication_error _________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ StackExchangeTests.test_login _________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ StackExchangeTests.test_login_with_pkce_disabled _______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ StackExchangeTests.test_login_with_pkce_enabled ________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________ StocktwitsTests.test_account_refresh_token_saved_next_login __________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ StocktwitsTests.test_account_tokens ______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ StocktwitsTests.test_authentication_error ___________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ StocktwitsTests.test_login __________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ StocktwitsTests.test_login_with_pkce_disabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ StocktwitsTests.test_login_with_pkce_enabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ StravaTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ StravaTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ StravaTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ StravaTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ StravaTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ StravaTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ StravaTests.test_valid_avatar _________________________ self = def test_valid_avatar(self): """test response with Avatar URL""" > self.login(self.get_mocked_response_avatar_invalid_id()) allauth/socialaccount/providers/strava/tests.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ StripeTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ StripeTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ StripeTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ StripeTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ StripeTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ StripeTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________________ test_login __________________________________ client = , db = None telegram_app = None def test_login(client, db, telegram_app): > resp = client.post(reverse("telegram_login")) allauth/socialaccount/providers/telegram/tests.py:26: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________________ test_callback_get _______________________________ client = , db = None telegram_app = None def test_callback_get(client, db, telegram_app): > resp = client.get(reverse("telegram_callback")) allauth/socialaccount/providers/telegram/tests.py:34: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________________ test_callback _________________________________ client = , db = None telegram_app = None sociallogin_setup_state = .setup at 0x7f2983d4d640> def test_callback(client, db, telegram_app, sociallogin_setup_state): state = sociallogin_setup_state(client) auth_result = ( base64.b64encode( json.dumps( { "id": "123", "hash": "0744ab643757850e82fa8b4ac35978dca287c81df6a9829032d868c7f90e3b99", "auth_date": 2342342342, } ).encode("utf8") ) .decode("ascii") .replace("=", "") ) post_data = { "tgAuthResult": auth_result, } > resp = client.post(reverse("telegram_callback") + f"?state={state}", post_data) allauth/socialaccount/providers/telegram/tests.py:57: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ TikTokTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ TikTokTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ TikTokTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ TikTokTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ TikTokTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ TikTokTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ TrainingPeaksTests.test_account_refresh_token_saved_next_login ________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ TrainingPeaksTests.test_account_tokens ____________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ TrainingPeaksTests.test_authentication_error _________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ TrainingPeaksTests.test_login _________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ TrainingPeaksTests.test_login_with_pkce_disabled _______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ TrainingPeaksTests.test_login_with_pkce_enabled ________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ TrelloTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(reverse(self.provider.id + "_callback")) allauth/socialaccount/tests/__init__.py:131: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ TrelloTests.test_auto_signup _________________________ self = @override_settings( SOCIALACCOUNT_AUTO_SIGNUP=True, SOCIALACCOUNT_EMAIL_REQUIRED=False, ACCOUNT_EMAIL_REQUIRED=False, ) def test_auto_signup(self): resp_mocks = self.get_mocked_response() if not resp_mocks: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:98: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ TrelloTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mocks = self.get_mocked_response() if resp_mocks is None: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:67: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ TumblrTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(reverse(self.provider.id + "_callback")) allauth/socialaccount/tests/__init__.py:131: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ TumblrTests.test_auto_signup _________________________ self = @override_settings( SOCIALACCOUNT_AUTO_SIGNUP=True, SOCIALACCOUNT_EMAIL_REQUIRED=False, ACCOUNT_EMAIL_REQUIRED=False, ) def test_auto_signup(self): resp_mocks = self.get_mocked_response() if not resp_mocks: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:98: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ TumblrTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mocks = self.get_mocked_response() if resp_mocks is None: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:67: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______ TwentyThreeAndMeTests.test_account_refresh_token_saved_next_login _______ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ TwentyThreeAndMeTests.test_account_tokens ___________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ TwentyThreeAndMeTests.test_authentication_error ________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ TwentyThreeAndMeTests.test_login _______________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ TwentyThreeAndMeTests.test_login_with_pkce_disabled ______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ TwentyThreeAndMeTests.test_login_with_pkce_enabled ______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ TwitchTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ TwitchTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ TwitchTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ TwitchTests.test_empty_or_missing_data_key_raises_OAuth2Error _________ self = def test_empty_or_missing_data_key_raises_OAuth2Error(self): resp_mock = MockedResponse(200, '{"data": []}') expected_error = "Invalid data from Twitch API: {'data': []}" > self.check_for_error(resp_mock, expected_error) allauth/socialaccount/providers/twitch/tests.py:50: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/twitch/tests.py:65: in check_for_error self._run_just_complete_login(resp_mock) allauth/socialaccount/providers/twitch/tests.py:77: in _run_just_complete_login reverse(self.provider.id + "_login"), /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ TwitchTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ TwitchTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ TwitchTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ TwitchTests.test_missing_twitch_id_raises_OAuth2Error _____________ self = def test_missing_twitch_id_raises_OAuth2Error(self): resp_mock = MockedResponse(200, '{"data": [{"login": "fake_twitch"}]}') expected_error = "Invalid data from Twitch API: {'login': 'fake_twitch'}" > self.check_for_error(resp_mock, expected_error) allauth/socialaccount/providers/twitch/tests.py:61: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/twitch/tests.py:65: in check_for_error self._run_just_complete_login(resp_mock) allauth/socialaccount/providers/twitch/tests.py:77: in _run_just_complete_login reverse(self.provider.id + "_login"), /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ TwitchTests.test_response_over_400_raises_OAuth2Error _____________ self = def test_response_over_400_raises_OAuth2Error(self): resp_mock = MockedResponse(400, '{"error": "Invalid token"}') expected_error = "Twitch API Error: Invalid token ()" > self.check_for_error(resp_mock, expected_error) allauth/socialaccount/providers/twitch/tests.py:44: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/twitch/tests.py:65: in check_for_error self._run_just_complete_login(resp_mock) allauth/socialaccount/providers/twitch/tests.py:77: in _run_just_complete_login reverse(self.provider.id + "_login"), /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ TwitterTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(reverse(self.provider.id + "_callback")) allauth/socialaccount/tests/__init__.py:131: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ TwitterTests.test_auto_signup _________________________ self = @override_settings( SOCIALACCOUNT_AUTO_SIGNUP=True, SOCIALACCOUNT_EMAIL_REQUIRED=False, ACCOUNT_EMAIL_REQUIRED=False, ) def test_auto_signup(self): resp_mocks = self.get_mocked_response() if not resp_mocks: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:98: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ TwitterTests.test_login ____________________________ self = def test_login(self): > super().test_login() allauth/socialaccount/providers/twitter/tests.py:35: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:67: in test_login resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ TwitterOAuth2Tests.test_account_refresh_token_saved_next_login ________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ TwitterOAuth2Tests.test_account_tokens ____________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ TwitterOAuth2Tests.test_authentication_error _________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ TwitterOAuth2Tests.test_login _________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ TwitterOAuth2Tests.test_login_with_pkce_disabled _______________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ TwitterOAuth2Tests.test_login_with_pkce_enabled ________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ UntappdTests.test_account_refresh_token_saved_next_login ___________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ UntappdTests.test_account_tokens _______________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ UntappdTests.test_authentication_error ____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________________ UntappdTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ UntappdTests.test_login_with_pkce_disabled __________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ UntappdTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ VimeoTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(reverse(self.provider.id + "_callback")) allauth/socialaccount/tests/__init__.py:131: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ VimeoTests.test_auto_signup __________________________ self = @override_settings( SOCIALACCOUNT_AUTO_SIGNUP=True, SOCIALACCOUNT_EMAIL_REQUIRED=False, ACCOUNT_EMAIL_REQUIRED=False, ) def test_auto_signup(self): resp_mocks = self.get_mocked_response() if not resp_mocks: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:98: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ VimeoTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mocks = self.get_mocked_response() if resp_mocks is None: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:67: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________ VimeoOAuth2Tests.test_account_refresh_token_saved_next_login _________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ VimeoOAuth2Tests.test_account_tokens _____________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ VimeoOAuth2Tests.test_authentication_error __________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ VimeoOAuth2Tests.test_login __________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ VimeoOAuth2Tests.test_login_with_pkce_disabled ________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ VimeoOAuth2Tests.test_login_with_pkce_enabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ VKTests.test_account_refresh_token_saved_next_login ______________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ VKTests.test_account_tokens __________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ VKTests.test_authentication_error _______________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________________ VKTests.test_login ______________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ VKTests.test_login_with_pkce_disabled _____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ VKTests.test_login_with_pkce_enabled _____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ WahooTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ WahooTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ WahooTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ WahooTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ WahooTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ WahooTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ WeiboTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ WeiboTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ WeiboTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ WeiboTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ WeiboTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ WeiboTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ WeixinTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ WeixinTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ WeixinTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ WeixinTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ WeixinTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ WeixinTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________ WindowsLiveTests.test_account_refresh_token_saved_next_login _________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ WindowsLiveTests.test_account_tokens _____________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ WindowsLiveTests.test_authentication_error __________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________ WindowsLiveTests.test_login __________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ WindowsLiveTests.test_login_with_pkce_disabled ________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ WindowsLiveTests.test_login_with_pkce_enabled _________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ XingTests.test_authentication_error ______________________ self = def test_authentication_error(self): > resp = self.client.get(reverse(self.provider.id + "_callback")) allauth/socialaccount/tests/__init__.py:131: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ XingTests.test_auto_signup __________________________ self = @override_settings( SOCIALACCOUNT_AUTO_SIGNUP=True, SOCIALACCOUNT_EMAIL_REQUIRED=False, ACCOUNT_EMAIL_REQUIRED=False, ) def test_auto_signup(self): resp_mocks = self.get_mocked_response() if not resp_mocks: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:98: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ XingTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mocks = self.get_mocked_response() if resp_mocks is None: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login(resp_mocks) allauth/socialaccount/tests/__init__.py:67: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:111: in login reverse(self.provider.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ YahooTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ YahooTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ YahooTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ YahooTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ YahooTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ YahooTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ YandexTests.test_account_refresh_token_saved_next_login ____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ YandexTests.test_account_tokens ________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ YandexTests.test_authentication_error _____________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ YandexTests.test_login ____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ YandexTests.test_login_with_pkce_disabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ YandexTests.test_login_with_pkce_enabled ___________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ YNABTests.test_account_refresh_token_saved_next_login _____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ YNABTests.test_account_tokens _________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ YNABTests.test_authentication_error ______________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ YNABTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ YNABTests.test_login_with_pkce_disabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ YNABTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ YNABTests.test_ynab_compelete_login_401 ____________________ self = def test_ynab_compelete_login_401(self): from allauth.socialaccount.providers.ynab.views import ( YNABOAuth2Adapter, ) class LessMockedResponse(MockedResponse): def raise_for_status(self): if self.status_code != 200: raise HTTPError(None) request = RequestFactory().get( > reverse(self.provider.id + "_login"), dict(process="login") ) allauth/socialaccount/providers/ynab/tests.py:50: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ ZohoTests.test_account_refresh_token_saved_next_login _____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ ZohoTests.test_account_tokens _________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ ZohoTests.test_authentication_error ______________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ ZohoTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ ZohoTests.test_login_with_pkce_disabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ ZohoTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ ZoomTests.test_account_refresh_token_saved_next_login _____________ self = @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_refresh_token_saved_next_login(self): """ fails if a login missing a refresh token, deletes the previously saved refresh token. Systems such as google's oauth only send a refresh token on first login. """ > self.test_account_tokens(multiple_login=True) allauth/socialaccount/tests/__init__.py:319: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/utils.py:456: in inner return func(*args, **kwargs) allauth/socialaccount/tests/__init__.py:280: in test_account_tokens self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________________ ZoomTests.test_account_tokens _________________________ self = multiple_login = False @override_settings(SOCIALACCOUNT_STORE_TOKENS=True) def test_account_tokens(self, multiple_login=False): email = "user@example.com" user = get_user_model()(is_active=True) user_email(user, email) user_username(user, "user") user.set_password("test") user.save() EmailAddress.objects.create(user=user, email=email, primary=True, verified=True) self.client.login(username=user.username, password="test") > self.login(self.get_mocked_response(), process="connect") allauth/socialaccount/tests/__init__.py:280: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ ZoomTests.test_authentication_error ______________________ self = def test_authentication_error(self): > resp = self.client.get(self.provider.get_callback_url()) allauth/socialaccount/tests/__init__.py:387: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/oauth2/provider.py:31: in get_callback_url return reverse(self.id + "_callback") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ ZoomTests.test_login _____________________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login(self): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:221: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ ZoomTests.test_login_with_pkce_disabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_disabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_disabled = provider_settings.copy() provider_settings_with_pkce_disabled["OAUTH_PKCE_ENABLED"] = False with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_disabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:243: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ ZoomTests.test_login_with_pkce_enabled ____________________ self = @override_settings(SOCIALACCOUNT_AUTO_SIGNUP=False) def test_login_with_pkce_enabled(self): provider_settings = app_settings.PROVIDERS.get(self.app.provider, {}) provider_settings_with_pkce_enabled = provider_settings.copy() provider_settings_with_pkce_enabled["OAUTH_PKCE_ENABLED"] = True with self.settings( SOCIALACCOUNT_PROVIDERS={ self.app.provider: provider_settings_with_pkce_enabled } ): resp_mock = self.get_mocked_response() if not resp_mock: warnings.warn( "Cannot test provider %s, no oauth mock" % self.provider.id ) return > resp = self.login( resp_mock, ) allauth/socialaccount/tests/__init__.py:265: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/__init__.py:324: in login self.provider.get_login_url(self.request, process=process) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_generate_state_param ___________________________ settings = client = , db = None google_provider_settings = {'APPS': [{'client_id': 'client_id', 'secret': 'secret'}]} def test_generate_state_param(settings, client, db, google_provider_settings): settings.SOCIALACCOUNT_ADAPTER = ( "allauth.socialaccount.tests.test_adapter.TestSocialAccountAdapter" ) > resp = client.post(reverse("google_login")) allauth/socialaccount/tests/test_adapter.py:23: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ test_disconnect[False] ____________________________ auth_client = user = settings = mailoutbox = [], reauthentication_required = False @pytest.mark.parametrize("reauthentication_required", [False, True]) def test_disconnect(auth_client, user, settings, mailoutbox, reauthentication_required): settings.ACCOUNT_EMAIL_NOTIFICATIONS = True settings.ACCOUNT_REAUTHENTICATION_REQUIRED = reauthentication_required account_to_del = SocialAccount.objects.create( uid="123", provider="other-server", user=user ) account_to_keep = SocialAccount.objects.create( uid="456", provider="other-server", user=user ) > resp = auth_client.get(reverse("socialaccount_connections")) allauth/socialaccount/tests/test_connect.py:23: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________________ test_disconnect[True] _____________________________ auth_client = user = settings = mailoutbox = [], reauthentication_required = True @pytest.mark.parametrize("reauthentication_required", [False, True]) def test_disconnect(auth_client, user, settings, mailoutbox, reauthentication_required): settings.ACCOUNT_EMAIL_NOTIFICATIONS = True settings.ACCOUNT_REAUTHENTICATION_REQUIRED = reauthentication_required account_to_del = SocialAccount.objects.create( uid="123", provider="other-server", user=user ) account_to_keep = SocialAccount.objects.create( uid="456", provider="other-server", user=user ) > resp = auth_client.get(reverse("socialaccount_connections")) allauth/socialaccount/tests/test_connect.py:23: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________ test_connect_with_reauthentication ______________________ auth_client = user = provider_callback_response = .f at 0x7f29832792d0> settings = user_password = 'b30a6873-2e68-45b6-9d74-28c372b81cdf' def test_connect_with_reauthentication( auth_client, user, provider_callback_response, settings, user_password ): settings.ACCOUNT_REAUTHENTICATION_REQUIRED = True > resp = provider_callback_response(auth_client, process="connect") allauth/socialaccount/tests/test_connect.py:42: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/conftest.py:32: in f reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________________________ test_connect _________________________________ auth_client = user = provider_callback_response = .f at 0x7f298327a2a0> settings = user_password = 'dcfb1141-3c14-4ff3-af3c-3879d911faf1', mailoutbox = [] def test_connect( auth_client, user, provider_callback_response, settings, user_password, mailoutbox ): settings.ACCOUNT_EMAIL_NOTIFICATIONS = True settings.ACCOUNT_REAUTHENTICATION_REQUIRED = False > resp = provider_callback_response(auth_client, process="connect") allauth/socialaccount/tests/test_connect.py:57: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/conftest.py:32: in f reverse( /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ test_connect_vs_email_authentication[False-False-added] ____________ request_factory = .RequestFactory object at 0x7f2986abc830> sociallogin_factory = .factory at 0x7f2983a23480> user = settings = email_authentication = False, account_exists = False, expected_action = 'added' @pytest.mark.parametrize( "email_authentication,account_exists, expected_action", [ (False, False, "added"), (False, True, "updated"), (True, False, "added"), (True, True, "updated"), ], ) def test_connect_vs_email_authentication( request_factory, sociallogin_factory, user, settings, email_authentication, account_exists, expected_action, ): settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = email_authentication sociallogin = sociallogin_factory(email=user.email, provider="unittest-server") if account_exists: account = sociallogin.account account.user = user account.save() sociallogin.state["process"] = AuthProcess.CONNECT request = request_factory.get("/") request.user = user with patch( "allauth.account.adapter.DefaultAccountAdapter.add_message" ) as add_message: > flows.login.complete_login(request, sociallogin) allauth/socialaccount/tests/test_connect.py:96: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/internal/flows/login.py:54: in complete_login return connect(request, sociallogin) allauth/socialaccount/internal/flows/connect.py:94: in connect default_next = get_adapter().get_connect_redirect_url(request, sociallogin.account) allauth/socialaccount/adapter.py:146: in get_connect_redirect_url url = reverse("socialaccount_connections") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ test_connect_vs_email_authentication[False-True-updated] ___________ request_factory = .RequestFactory object at 0x7f29854696a0> sociallogin_factory = .factory at 0x7f2983c209e0> user = settings = email_authentication = False, account_exists = True, expected_action = 'updated' @pytest.mark.parametrize( "email_authentication,account_exists, expected_action", [ (False, False, "added"), (False, True, "updated"), (True, False, "added"), (True, True, "updated"), ], ) def test_connect_vs_email_authentication( request_factory, sociallogin_factory, user, settings, email_authentication, account_exists, expected_action, ): settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = email_authentication sociallogin = sociallogin_factory(email=user.email, provider="unittest-server") if account_exists: account = sociallogin.account account.user = user account.save() sociallogin.state["process"] = AuthProcess.CONNECT request = request_factory.get("/") request.user = user with patch( "allauth.account.adapter.DefaultAccountAdapter.add_message" ) as add_message: > flows.login.complete_login(request, sociallogin) allauth/socialaccount/tests/test_connect.py:96: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/internal/flows/login.py:54: in complete_login return connect(request, sociallogin) allauth/socialaccount/internal/flows/connect.py:94: in connect default_next = get_adapter().get_connect_redirect_url(request, sociallogin.account) allauth/socialaccount/adapter.py:146: in get_connect_redirect_url url = reverse("socialaccount_connections") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ test_connect_vs_email_authentication[True-False-added] ____________ request_factory = .RequestFactory object at 0x7f29850efe00> sociallogin_factory = .factory at 0x7f29839478a0> user = settings = email_authentication = True, account_exists = False, expected_action = 'added' @pytest.mark.parametrize( "email_authentication,account_exists, expected_action", [ (False, False, "added"), (False, True, "updated"), (True, False, "added"), (True, True, "updated"), ], ) def test_connect_vs_email_authentication( request_factory, sociallogin_factory, user, settings, email_authentication, account_exists, expected_action, ): settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = email_authentication sociallogin = sociallogin_factory(email=user.email, provider="unittest-server") if account_exists: account = sociallogin.account account.user = user account.save() sociallogin.state["process"] = AuthProcess.CONNECT request = request_factory.get("/") request.user = user with patch( "allauth.account.adapter.DefaultAccountAdapter.add_message" ) as add_message: > flows.login.complete_login(request, sociallogin) allauth/socialaccount/tests/test_connect.py:96: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/internal/flows/login.py:54: in complete_login return connect(request, sociallogin) allauth/socialaccount/internal/flows/connect.py:94: in connect default_next = get_adapter().get_connect_redirect_url(request, sociallogin.account) allauth/socialaccount/adapter.py:146: in get_connect_redirect_url url = reverse("socialaccount_connections") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________ test_connect_vs_email_authentication[True-True-updated] ____________ request_factory = .RequestFactory object at 0x7f2985246120> sociallogin_factory = .factory at 0x7f29831f0a90> user = settings = email_authentication = True, account_exists = True, expected_action = 'updated' @pytest.mark.parametrize( "email_authentication,account_exists, expected_action", [ (False, False, "added"), (False, True, "updated"), (True, False, "added"), (True, True, "updated"), ], ) def test_connect_vs_email_authentication( request_factory, sociallogin_factory, user, settings, email_authentication, account_exists, expected_action, ): settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = email_authentication sociallogin = sociallogin_factory(email=user.email, provider="unittest-server") if account_exists: account = sociallogin.account account.user = user account.save() sociallogin.state["process"] = AuthProcess.CONNECT request = request_factory.get("/") request.user = user with patch( "allauth.account.adapter.DefaultAccountAdapter.add_message" ) as add_message: > flows.login.complete_login(request, sociallogin) allauth/socialaccount/tests/test_connect.py:96: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/internal/flows/login.py:54: in complete_login return connect(request, sociallogin) allauth/socialaccount/internal/flows/connect.py:94: in connect default_next = get_adapter().get_connect_redirect_url(request, sociallogin.account) allauth/socialaccount/adapter.py:146: in get_connect_redirect_url url = reverse("socialaccount_connections") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ test_email_authentication[off-False-False] __________________ db = None, setting = 'off' settings = user_factory = .factory at 0x7f29831f0300> sociallogin_factory = .factory at 0x7f29831f1c70> client = request_factory = .RequestFactory object at 0x7f2985244440> mailoutbox = [], auto_connect = False, with_emailaddress = False @pytest.mark.parametrize("with_emailaddress", [False, True]) @pytest.mark.parametrize("auto_connect", [False, True]) @pytest.mark.parametrize("setting", ["off", "on-global", "on-provider"]) def test_email_authentication( db, setting, settings, user_factory, sociallogin_factory, client, request_factory, mailoutbox, auto_connect, with_emailaddress, ): """Tests that when an already existing email is given at the social signup form, enumeration preventation kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.SOCIALACCOUNT_AUTO_SIGNUP = True settings.SOCIALACCOUNT_STORE_TOKENS = True if setting == "on-global": settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = True elif setting == "on-provider": settings.SOCIALACCOUNT_PROVIDERS = copy.deepcopy( settings.SOCIALACCOUNT_PROVIDERS ) settings.SOCIALACCOUNT_PROVIDERS["openid_connect"][ "EMAIL_AUTHENTICATION" ] = True else: settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = False settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION_AUTO_CONNECT = auto_connect user = user_factory(with_emailaddress=with_emailaddress) assert user.has_usable_password() sociallogin = sociallogin_factory( email=user.email, provider="unittest-server", with_token=True ) request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): with patch( "allauth.socialaccount.signals.social_account_updated.send" ) as updated_signal: with patch( "allauth.socialaccount.signals.social_account_added.send" ) as added_signal: > resp = complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:84: in process_signup auto_signup, resp = process_auto_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:73: in process_auto_signup resp = prevent_enumeration(request, email) allauth/account/internal/flows/signup.py:16: in prevent_enumeration adapter.send_account_already_exists_mail(email) allauth/account/adapter.py:607: in send_account_already_exists_mail signup_url = flows.signup.get_signup_url(context.request) allauth/account/internal/flows/signup.py:45: in get_signup_url url = build_absolute_uri(request, reverse("account_signup")) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ test_email_authentication[off-False-True] ___________________ db = None, setting = 'off' settings = user_factory = .factory at 0x7f2983255430> sociallogin_factory = .factory at 0x7f2983104720> client = request_factory = .RequestFactory object at 0x7f29851a5fd0> mailoutbox = [], auto_connect = False, with_emailaddress = True @pytest.mark.parametrize("with_emailaddress", [False, True]) @pytest.mark.parametrize("auto_connect", [False, True]) @pytest.mark.parametrize("setting", ["off", "on-global", "on-provider"]) def test_email_authentication( db, setting, settings, user_factory, sociallogin_factory, client, request_factory, mailoutbox, auto_connect, with_emailaddress, ): """Tests that when an already existing email is given at the social signup form, enumeration preventation kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.SOCIALACCOUNT_AUTO_SIGNUP = True settings.SOCIALACCOUNT_STORE_TOKENS = True if setting == "on-global": settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = True elif setting == "on-provider": settings.SOCIALACCOUNT_PROVIDERS = copy.deepcopy( settings.SOCIALACCOUNT_PROVIDERS ) settings.SOCIALACCOUNT_PROVIDERS["openid_connect"][ "EMAIL_AUTHENTICATION" ] = True else: settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = False settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION_AUTO_CONNECT = auto_connect user = user_factory(with_emailaddress=with_emailaddress) assert user.has_usable_password() sociallogin = sociallogin_factory( email=user.email, provider="unittest-server", with_token=True ) request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): with patch( "allauth.socialaccount.signals.social_account_updated.send" ) as updated_signal: with patch( "allauth.socialaccount.signals.social_account_added.send" ) as added_signal: > resp = complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:84: in process_signup auto_signup, resp = process_auto_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:73: in process_auto_signup resp = prevent_enumeration(request, email) allauth/account/internal/flows/signup.py:16: in prevent_enumeration adapter.send_account_already_exists_mail(email) allauth/account/adapter.py:607: in send_account_already_exists_mail signup_url = flows.signup.get_signup_url(context.request) allauth/account/internal/flows/signup.py:45: in get_signup_url url = build_absolute_uri(request, reverse("account_signup")) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ test_email_authentication[off-True-False] ___________________ db = None, setting = 'off' settings = user_factory = .factory at 0x7f29836f8670> sociallogin_factory = .factory at 0x7f29836f9430> client = request_factory = .RequestFactory object at 0x7f29851a5be0> mailoutbox = [], auto_connect = True, with_emailaddress = False @pytest.mark.parametrize("with_emailaddress", [False, True]) @pytest.mark.parametrize("auto_connect", [False, True]) @pytest.mark.parametrize("setting", ["off", "on-global", "on-provider"]) def test_email_authentication( db, setting, settings, user_factory, sociallogin_factory, client, request_factory, mailoutbox, auto_connect, with_emailaddress, ): """Tests that when an already existing email is given at the social signup form, enumeration preventation kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.SOCIALACCOUNT_AUTO_SIGNUP = True settings.SOCIALACCOUNT_STORE_TOKENS = True if setting == "on-global": settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = True elif setting == "on-provider": settings.SOCIALACCOUNT_PROVIDERS = copy.deepcopy( settings.SOCIALACCOUNT_PROVIDERS ) settings.SOCIALACCOUNT_PROVIDERS["openid_connect"][ "EMAIL_AUTHENTICATION" ] = True else: settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = False settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION_AUTO_CONNECT = auto_connect user = user_factory(with_emailaddress=with_emailaddress) assert user.has_usable_password() sociallogin = sociallogin_factory( email=user.email, provider="unittest-server", with_token=True ) request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): with patch( "allauth.socialaccount.signals.social_account_updated.send" ) as updated_signal: with patch( "allauth.socialaccount.signals.social_account_added.send" ) as added_signal: > resp = complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:84: in process_signup auto_signup, resp = process_auto_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:73: in process_auto_signup resp = prevent_enumeration(request, email) allauth/account/internal/flows/signup.py:16: in prevent_enumeration adapter.send_account_already_exists_mail(email) allauth/account/adapter.py:607: in send_account_already_exists_mail signup_url = flows.signup.get_signup_url(context.request) allauth/account/internal/flows/signup.py:45: in get_signup_url url = build_absolute_uri(request, reverse("account_signup")) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_email_authentication[off-True-True] ___________________ db = None, setting = 'off' settings = user_factory = .factory at 0x7f2982fb4040> sociallogin_factory = .factory at 0x7f2982fb4ca0> client = request_factory = .RequestFactory object at 0x7f29851a4c20> mailoutbox = [], auto_connect = True, with_emailaddress = True @pytest.mark.parametrize("with_emailaddress", [False, True]) @pytest.mark.parametrize("auto_connect", [False, True]) @pytest.mark.parametrize("setting", ["off", "on-global", "on-provider"]) def test_email_authentication( db, setting, settings, user_factory, sociallogin_factory, client, request_factory, mailoutbox, auto_connect, with_emailaddress, ): """Tests that when an already existing email is given at the social signup form, enumeration preventation kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.SOCIALACCOUNT_AUTO_SIGNUP = True settings.SOCIALACCOUNT_STORE_TOKENS = True if setting == "on-global": settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = True elif setting == "on-provider": settings.SOCIALACCOUNT_PROVIDERS = copy.deepcopy( settings.SOCIALACCOUNT_PROVIDERS ) settings.SOCIALACCOUNT_PROVIDERS["openid_connect"][ "EMAIL_AUTHENTICATION" ] = True else: settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = False settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION_AUTO_CONNECT = auto_connect user = user_factory(with_emailaddress=with_emailaddress) assert user.has_usable_password() sociallogin = sociallogin_factory( email=user.email, provider="unittest-server", with_token=True ) request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): with patch( "allauth.socialaccount.signals.social_account_updated.send" ) as updated_signal: with patch( "allauth.socialaccount.signals.social_account_added.send" ) as added_signal: > resp = complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:84: in process_signup auto_signup, resp = process_auto_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:73: in process_auto_signup resp = prevent_enumeration(request, email) allauth/account/internal/flows/signup.py:16: in prevent_enumeration adapter.send_account_already_exists_mail(email) allauth/account/adapter.py:607: in send_account_already_exists_mail signup_url = flows.signup.get_signup_url(context.request) allauth/account/internal/flows/signup.py:45: in get_signup_url url = build_absolute_uri(request, reverse("account_signup")) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_email_authentication[on-global-False-False] _______________ db = None, setting = 'on-global' settings = user_factory = .factory at 0x7f298327b5e0> sociallogin_factory = .factory at 0x7f2983279380> client = request_factory = .RequestFactory object at 0x7f298546b620> mailoutbox = [], auto_connect = False, with_emailaddress = False @pytest.mark.parametrize("with_emailaddress", [False, True]) @pytest.mark.parametrize("auto_connect", [False, True]) @pytest.mark.parametrize("setting", ["off", "on-global", "on-provider"]) def test_email_authentication( db, setting, settings, user_factory, sociallogin_factory, client, request_factory, mailoutbox, auto_connect, with_emailaddress, ): """Tests that when an already existing email is given at the social signup form, enumeration preventation kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.SOCIALACCOUNT_AUTO_SIGNUP = True settings.SOCIALACCOUNT_STORE_TOKENS = True if setting == "on-global": settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = True elif setting == "on-provider": settings.SOCIALACCOUNT_PROVIDERS = copy.deepcopy( settings.SOCIALACCOUNT_PROVIDERS ) settings.SOCIALACCOUNT_PROVIDERS["openid_connect"][ "EMAIL_AUTHENTICATION" ] = True else: settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = False settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION_AUTO_CONNECT = auto_connect user = user_factory(with_emailaddress=with_emailaddress) assert user.has_usable_password() sociallogin = sociallogin_factory( email=user.email, provider="unittest-server", with_token=True ) request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): with patch( "allauth.socialaccount.signals.social_account_updated.send" ) as updated_signal: with patch( "allauth.socialaccount.signals.social_account_added.send" ) as added_signal: > resp = complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:80: in _authenticate ret = _login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:25: in _login return perform_login( allauth/account/utils.py:160: in perform_login return flows.login.perform_login(request, login) allauth/account/internal/flows/login.py:83: in perform_login return resume_login(request, login) allauth/account/internal/flows/login.py:92: in resume_login response = ctrl.handle() allauth/account/stages.py:104: in handle stages = self.get_stages() allauth/account/stages.py:96: in get_stages cls = import_callable(path) allauth/utils.py:151: in import_callable ret = import_attribute(path_or_callable) allauth/utils.py:145: in import_attribute ret = getattr(importlib.import_module(pkg), attr) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_email_authentication[on-global-False-True] ________________ db = None, setting = 'on-global' settings = user_factory = .factory at 0x7f298327bb60> sociallogin_factory = .factory at 0x7f2983279dd0> client = request_factory = .RequestFactory object at 0x7f29854682f0> mailoutbox = [], auto_connect = False, with_emailaddress = True @pytest.mark.parametrize("with_emailaddress", [False, True]) @pytest.mark.parametrize("auto_connect", [False, True]) @pytest.mark.parametrize("setting", ["off", "on-global", "on-provider"]) def test_email_authentication( db, setting, settings, user_factory, sociallogin_factory, client, request_factory, mailoutbox, auto_connect, with_emailaddress, ): """Tests that when an already existing email is given at the social signup form, enumeration preventation kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.SOCIALACCOUNT_AUTO_SIGNUP = True settings.SOCIALACCOUNT_STORE_TOKENS = True if setting == "on-global": settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = True elif setting == "on-provider": settings.SOCIALACCOUNT_PROVIDERS = copy.deepcopy( settings.SOCIALACCOUNT_PROVIDERS ) settings.SOCIALACCOUNT_PROVIDERS["openid_connect"][ "EMAIL_AUTHENTICATION" ] = True else: settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = False settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION_AUTO_CONNECT = auto_connect user = user_factory(with_emailaddress=with_emailaddress) assert user.has_usable_password() sociallogin = sociallogin_factory( email=user.email, provider="unittest-server", with_token=True ) request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): with patch( "allauth.socialaccount.signals.social_account_updated.send" ) as updated_signal: with patch( "allauth.socialaccount.signals.social_account_added.send" ) as added_signal: > resp = complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:80: in _authenticate ret = _login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:25: in _login return perform_login( allauth/account/utils.py:160: in perform_login return flows.login.perform_login(request, login) allauth/account/internal/flows/login.py:83: in perform_login return resume_login(request, login) allauth/account/internal/flows/login.py:92: in resume_login response = ctrl.handle() allauth/account/stages.py:104: in handle stages = self.get_stages() allauth/account/stages.py:96: in get_stages cls = import_callable(path) allauth/utils.py:151: in import_callable ret = import_attribute(path_or_callable) allauth/utils.py:145: in import_attribute ret = getattr(importlib.import_module(pkg), attr) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_email_authentication[on-global-True-False] ________________ db = None, setting = 'on-global' settings = user_factory = .factory at 0x7f2983366cf0> sociallogin_factory = .factory at 0x7f2983367ed0> client = request_factory = .RequestFactory object at 0x7f298546acf0> mailoutbox = [], auto_connect = True, with_emailaddress = False @pytest.mark.parametrize("with_emailaddress", [False, True]) @pytest.mark.parametrize("auto_connect", [False, True]) @pytest.mark.parametrize("setting", ["off", "on-global", "on-provider"]) def test_email_authentication( db, setting, settings, user_factory, sociallogin_factory, client, request_factory, mailoutbox, auto_connect, with_emailaddress, ): """Tests that when an already existing email is given at the social signup form, enumeration preventation kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.SOCIALACCOUNT_AUTO_SIGNUP = True settings.SOCIALACCOUNT_STORE_TOKENS = True if setting == "on-global": settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = True elif setting == "on-provider": settings.SOCIALACCOUNT_PROVIDERS = copy.deepcopy( settings.SOCIALACCOUNT_PROVIDERS ) settings.SOCIALACCOUNT_PROVIDERS["openid_connect"][ "EMAIL_AUTHENTICATION" ] = True else: settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = False settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION_AUTO_CONNECT = auto_connect user = user_factory(with_emailaddress=with_emailaddress) assert user.has_usable_password() sociallogin = sociallogin_factory( email=user.email, provider="unittest-server", with_token=True ) request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): with patch( "allauth.socialaccount.signals.social_account_updated.send" ) as updated_signal: with patch( "allauth.socialaccount.signals.social_account_added.send" ) as added_signal: > resp = complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:80: in _authenticate ret = _login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:25: in _login return perform_login( allauth/account/utils.py:160: in perform_login return flows.login.perform_login(request, login) allauth/account/internal/flows/login.py:83: in perform_login return resume_login(request, login) allauth/account/internal/flows/login.py:92: in resume_login response = ctrl.handle() allauth/account/stages.py:104: in handle stages = self.get_stages() allauth/account/stages.py:96: in get_stages cls = import_callable(path) allauth/utils.py:151: in import_callable ret = import_attribute(path_or_callable) allauth/utils.py:145: in import_attribute ret = getattr(importlib.import_module(pkg), attr) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_email_authentication[on-global-True-True] ________________ db = None, setting = 'on-global' settings = user_factory = .factory at 0x7f2983366fb0> sociallogin_factory = .factory at 0x7f29833668d0> client = request_factory = .RequestFactory object at 0x7f29852457f0> mailoutbox = [], auto_connect = True, with_emailaddress = True @pytest.mark.parametrize("with_emailaddress", [False, True]) @pytest.mark.parametrize("auto_connect", [False, True]) @pytest.mark.parametrize("setting", ["off", "on-global", "on-provider"]) def test_email_authentication( db, setting, settings, user_factory, sociallogin_factory, client, request_factory, mailoutbox, auto_connect, with_emailaddress, ): """Tests that when an already existing email is given at the social signup form, enumeration preventation kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.SOCIALACCOUNT_AUTO_SIGNUP = True settings.SOCIALACCOUNT_STORE_TOKENS = True if setting == "on-global": settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = True elif setting == "on-provider": settings.SOCIALACCOUNT_PROVIDERS = copy.deepcopy( settings.SOCIALACCOUNT_PROVIDERS ) settings.SOCIALACCOUNT_PROVIDERS["openid_connect"][ "EMAIL_AUTHENTICATION" ] = True else: settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = False settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION_AUTO_CONNECT = auto_connect user = user_factory(with_emailaddress=with_emailaddress) assert user.has_usable_password() sociallogin = sociallogin_factory( email=user.email, provider="unittest-server", with_token=True ) request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): with patch( "allauth.socialaccount.signals.social_account_updated.send" ) as updated_signal: with patch( "allauth.socialaccount.signals.social_account_added.send" ) as added_signal: > resp = complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:80: in _authenticate ret = _login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:25: in _login return perform_login( allauth/account/utils.py:160: in perform_login return flows.login.perform_login(request, login) allauth/account/internal/flows/login.py:83: in perform_login return resume_login(request, login) allauth/account/internal/flows/login.py:92: in resume_login response = ctrl.handle() allauth/account/stages.py:104: in handle stages = self.get_stages() allauth/account/stages.py:96: in get_stages cls = import_callable(path) allauth/utils.py:151: in import_callable ret = import_attribute(path_or_callable) allauth/utils.py:145: in import_attribute ret = getattr(importlib.import_module(pkg), attr) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ test_email_authentication[on-provider-False-False] ______________ db = None, setting = 'on-provider' settings = user_factory = .factory at 0x7f298351dd20> sociallogin_factory = .factory at 0x7f298351ceb0> client = request_factory = .RequestFactory object at 0x7f2985247b60> mailoutbox = [], auto_connect = False, with_emailaddress = False @pytest.mark.parametrize("with_emailaddress", [False, True]) @pytest.mark.parametrize("auto_connect", [False, True]) @pytest.mark.parametrize("setting", ["off", "on-global", "on-provider"]) def test_email_authentication( db, setting, settings, user_factory, sociallogin_factory, client, request_factory, mailoutbox, auto_connect, with_emailaddress, ): """Tests that when an already existing email is given at the social signup form, enumeration preventation kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.SOCIALACCOUNT_AUTO_SIGNUP = True settings.SOCIALACCOUNT_STORE_TOKENS = True if setting == "on-global": settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = True elif setting == "on-provider": settings.SOCIALACCOUNT_PROVIDERS = copy.deepcopy( settings.SOCIALACCOUNT_PROVIDERS ) settings.SOCIALACCOUNT_PROVIDERS["openid_connect"][ "EMAIL_AUTHENTICATION" ] = True else: settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = False settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION_AUTO_CONNECT = auto_connect user = user_factory(with_emailaddress=with_emailaddress) assert user.has_usable_password() sociallogin = sociallogin_factory( email=user.email, provider="unittest-server", with_token=True ) request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): with patch( "allauth.socialaccount.signals.social_account_updated.send" ) as updated_signal: with patch( "allauth.socialaccount.signals.social_account_added.send" ) as added_signal: > resp = complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:80: in _authenticate ret = _login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:25: in _login return perform_login( allauth/account/utils.py:160: in perform_login return flows.login.perform_login(request, login) allauth/account/internal/flows/login.py:83: in perform_login return resume_login(request, login) allauth/account/internal/flows/login.py:92: in resume_login response = ctrl.handle() allauth/account/stages.py:104: in handle stages = self.get_stages() allauth/account/stages.py:96: in get_stages cls = import_callable(path) allauth/utils.py:151: in import_callable ret = import_attribute(path_or_callable) allauth/utils.py:145: in import_attribute ret = getattr(importlib.import_module(pkg), attr) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ test_email_authentication[on-provider-False-True] _______________ db = None, setting = 'on-provider' settings = user_factory = .factory at 0x7f298351da60> sociallogin_factory = .factory at 0x7f298351de80> client = request_factory = .RequestFactory object at 0x7f2985701be0> mailoutbox = [], auto_connect = False, with_emailaddress = True @pytest.mark.parametrize("with_emailaddress", [False, True]) @pytest.mark.parametrize("auto_connect", [False, True]) @pytest.mark.parametrize("setting", ["off", "on-global", "on-provider"]) def test_email_authentication( db, setting, settings, user_factory, sociallogin_factory, client, request_factory, mailoutbox, auto_connect, with_emailaddress, ): """Tests that when an already existing email is given at the social signup form, enumeration preventation kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.SOCIALACCOUNT_AUTO_SIGNUP = True settings.SOCIALACCOUNT_STORE_TOKENS = True if setting == "on-global": settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = True elif setting == "on-provider": settings.SOCIALACCOUNT_PROVIDERS = copy.deepcopy( settings.SOCIALACCOUNT_PROVIDERS ) settings.SOCIALACCOUNT_PROVIDERS["openid_connect"][ "EMAIL_AUTHENTICATION" ] = True else: settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = False settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION_AUTO_CONNECT = auto_connect user = user_factory(with_emailaddress=with_emailaddress) assert user.has_usable_password() sociallogin = sociallogin_factory( email=user.email, provider="unittest-server", with_token=True ) request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): with patch( "allauth.socialaccount.signals.social_account_updated.send" ) as updated_signal: with patch( "allauth.socialaccount.signals.social_account_added.send" ) as added_signal: > resp = complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:80: in _authenticate ret = _login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:25: in _login return perform_login( allauth/account/utils.py:160: in perform_login return flows.login.perform_login(request, login) allauth/account/internal/flows/login.py:83: in perform_login return resume_login(request, login) allauth/account/internal/flows/login.py:92: in resume_login response = ctrl.handle() allauth/account/stages.py:104: in handle stages = self.get_stages() allauth/account/stages.py:96: in get_stages cls = import_callable(path) allauth/utils.py:151: in import_callable ret = import_attribute(path_or_callable) allauth/utils.py:145: in import_attribute ret = getattr(importlib.import_module(pkg), attr) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ test_email_authentication[on-provider-True-False] _______________ db = None, setting = 'on-provider' settings = user_factory = .factory at 0x7f2983a34b40> sociallogin_factory = .factory at 0x7f2983a35900> client = request_factory = .RequestFactory object at 0x7f2984d43cb0> mailoutbox = [], auto_connect = True, with_emailaddress = False @pytest.mark.parametrize("with_emailaddress", [False, True]) @pytest.mark.parametrize("auto_connect", [False, True]) @pytest.mark.parametrize("setting", ["off", "on-global", "on-provider"]) def test_email_authentication( db, setting, settings, user_factory, sociallogin_factory, client, request_factory, mailoutbox, auto_connect, with_emailaddress, ): """Tests that when an already existing email is given at the social signup form, enumeration preventation kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.SOCIALACCOUNT_AUTO_SIGNUP = True settings.SOCIALACCOUNT_STORE_TOKENS = True if setting == "on-global": settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = True elif setting == "on-provider": settings.SOCIALACCOUNT_PROVIDERS = copy.deepcopy( settings.SOCIALACCOUNT_PROVIDERS ) settings.SOCIALACCOUNT_PROVIDERS["openid_connect"][ "EMAIL_AUTHENTICATION" ] = True else: settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = False settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION_AUTO_CONNECT = auto_connect user = user_factory(with_emailaddress=with_emailaddress) assert user.has_usable_password() sociallogin = sociallogin_factory( email=user.email, provider="unittest-server", with_token=True ) request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): with patch( "allauth.socialaccount.signals.social_account_updated.send" ) as updated_signal: with patch( "allauth.socialaccount.signals.social_account_added.send" ) as added_signal: > resp = complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:80: in _authenticate ret = _login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:25: in _login return perform_login( allauth/account/utils.py:160: in perform_login return flows.login.perform_login(request, login) allauth/account/internal/flows/login.py:83: in perform_login return resume_login(request, login) allauth/account/internal/flows/login.py:92: in resume_login response = ctrl.handle() allauth/account/stages.py:104: in handle stages = self.get_stages() allauth/account/stages.py:96: in get_stages cls = import_callable(path) allauth/utils.py:151: in import_callable ret = import_attribute(path_or_callable) allauth/utils.py:145: in import_attribute ret = getattr(importlib.import_module(pkg), attr) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_email_authentication[on-provider-True-True] _______________ db = None, setting = 'on-provider' settings = user_factory = .factory at 0x7f29831f12d0> sociallogin_factory = .factory at 0x7f29831f1b10> client = request_factory = .RequestFactory object at 0x7f2984d41550> mailoutbox = [], auto_connect = True, with_emailaddress = True @pytest.mark.parametrize("with_emailaddress", [False, True]) @pytest.mark.parametrize("auto_connect", [False, True]) @pytest.mark.parametrize("setting", ["off", "on-global", "on-provider"]) def test_email_authentication( db, setting, settings, user_factory, sociallogin_factory, client, request_factory, mailoutbox, auto_connect, with_emailaddress, ): """Tests that when an already existing email is given at the social signup form, enumeration preventation kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.SOCIALACCOUNT_AUTO_SIGNUP = True settings.SOCIALACCOUNT_STORE_TOKENS = True if setting == "on-global": settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = True elif setting == "on-provider": settings.SOCIALACCOUNT_PROVIDERS = copy.deepcopy( settings.SOCIALACCOUNT_PROVIDERS ) settings.SOCIALACCOUNT_PROVIDERS["openid_connect"][ "EMAIL_AUTHENTICATION" ] = True else: settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = False settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION_AUTO_CONNECT = auto_connect user = user_factory(with_emailaddress=with_emailaddress) assert user.has_usable_password() sociallogin = sociallogin_factory( email=user.email, provider="unittest-server", with_token=True ) request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): with patch( "allauth.socialaccount.signals.social_account_updated.send" ) as updated_signal: with patch( "allauth.socialaccount.signals.social_account_added.send" ) as added_signal: > resp = complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:80: in _authenticate ret = _login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:25: in _login return perform_login( allauth/account/utils.py:160: in perform_login return flows.login.perform_login(request, login) allauth/account/internal/flows/login.py:83: in perform_login return resume_login(request, login) allauth/account/internal/flows/login.py:92: in resume_login response = ctrl.handle() allauth/account/stages.py:104: in handle stages = self.get_stages() allauth/account/stages.py:96: in get_stages cls = import_callable(path) allauth/utils.py:151: in import_callable ret = import_attribute(path_or_callable) allauth/utils.py:145: in import_attribute ret = getattr(importlib.import_module(pkg), attr) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_record_authentication[login-True-False] _________________ db = None sociallogin_factory = .factory at 0x7f29831f0bf0> client = request_factory = .RequestFactory object at 0x7f2984d40ad0> user = , process = 'login' did_record = True, store_tokens = False settings = @pytest.mark.parametrize("store_tokens", [False, True]) @pytest.mark.parametrize( "process,did_record", [ (AuthProcess.LOGIN, True), (AuthProcess.CONNECT, False), ], ) def test_record_authentication( db, sociallogin_factory, client, request_factory, user, process, did_record, store_tokens, settings, ): settings.SOCIALACCOUNT_STORE_TOKENS = store_tokens sociallogin = sociallogin_factory(provider="unittest-server", uid="123") sociallogin.state["process"] = process sociallogin.token = SocialToken( app=sociallogin.account.get_provider().app, token="123", token_secret="456" ) SocialAccount.objects.create(user=user, uid="123", provider="unittest-server") request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): > complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:134: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:80: in _authenticate ret = _login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:25: in _login return perform_login( allauth/account/utils.py:160: in perform_login return flows.login.perform_login(request, login) allauth/account/internal/flows/login.py:83: in perform_login return resume_login(request, login) allauth/account/internal/flows/login.py:92: in resume_login response = ctrl.handle() allauth/account/stages.py:104: in handle stages = self.get_stages() allauth/account/stages.py:96: in get_stages cls = import_callable(path) allauth/utils.py:151: in import_callable ret = import_attribute(path_or_callable) allauth/utils.py:145: in import_attribute ret = getattr(importlib.import_module(pkg), attr) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_record_authentication[login-True-True] __________________ db = None sociallogin_factory = .factory at 0x7f2982fb7320> client = request_factory = .RequestFactory object at 0x7f2984d41e80> user = , process = 'login' did_record = True, store_tokens = True settings = @pytest.mark.parametrize("store_tokens", [False, True]) @pytest.mark.parametrize( "process,did_record", [ (AuthProcess.LOGIN, True), (AuthProcess.CONNECT, False), ], ) def test_record_authentication( db, sociallogin_factory, client, request_factory, user, process, did_record, store_tokens, settings, ): settings.SOCIALACCOUNT_STORE_TOKENS = store_tokens sociallogin = sociallogin_factory(provider="unittest-server", uid="123") sociallogin.state["process"] = process sociallogin.token = SocialToken( app=sociallogin.account.get_provider().app, token="123", token_secret="456" ) SocialAccount.objects.create(user=user, uid="123", provider="unittest-server") request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): > complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:134: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:80: in _authenticate ret = _login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:25: in _login return perform_login( allauth/account/utils.py:160: in perform_login return flows.login.perform_login(request, login) allauth/account/internal/flows/login.py:83: in perform_login return resume_login(request, login) allauth/account/internal/flows/login.py:92: in resume_login response = ctrl.handle() allauth/account/stages.py:104: in handle stages = self.get_stages() allauth/account/stages.py:96: in get_stages cls = import_callable(path) allauth/utils.py:151: in import_callable ret = import_attribute(path_or_callable) allauth/utils.py:145: in import_attribute ret = getattr(importlib.import_module(pkg), attr) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_record_authentication[connect-False-False] ________________ request = sociallogin = def connect(request, sociallogin): try: > ok, action, message = do_connect(request, sociallogin) allauth/socialaccount/internal/flows/connect.py:73: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ request = sociallogin = def do_connect(request, sociallogin): if request.user.is_anonymous: > raise PermissionDenied() E django.core.exceptions.PermissionDenied allauth/socialaccount/internal/flows/connect.py:107: PermissionDenied During handling of the above exception, another exception occurred: db = None sociallogin_factory = .factory at 0x7f29836fb8a0> client = request_factory = .RequestFactory object at 0x7f29854a3e00> user = , process = 'connect' did_record = False, store_tokens = False settings = @pytest.mark.parametrize("store_tokens", [False, True]) @pytest.mark.parametrize( "process,did_record", [ (AuthProcess.LOGIN, True), (AuthProcess.CONNECT, False), ], ) def test_record_authentication( db, sociallogin_factory, client, request_factory, user, process, did_record, store_tokens, settings, ): settings.SOCIALACCOUNT_STORE_TOKENS = store_tokens sociallogin = sociallogin_factory(provider="unittest-server", uid="123") sociallogin.state["process"] = process sociallogin.token = SocialToken( app=sociallogin.account.get_provider().app, token="123", token_secret="456" ) SocialAccount.objects.create(user=user, uid="123", provider="unittest-server") request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): > complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:134: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:54: in complete_login return connect(request, sociallogin) allauth/socialaccount/internal/flows/connect.py:77: in connect connect_redirect_url = get_adapter().get_connect_redirect_url( allauth/socialaccount/adapter.py:146: in get_connect_redirect_url url = reverse("socialaccount_connections") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_record_authentication[connect-False-True] ________________ request = sociallogin = def connect(request, sociallogin): try: > ok, action, message = do_connect(request, sociallogin) allauth/socialaccount/internal/flows/connect.py:73: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ request = sociallogin = def do_connect(request, sociallogin): if request.user.is_anonymous: > raise PermissionDenied() E django.core.exceptions.PermissionDenied allauth/socialaccount/internal/flows/connect.py:107: PermissionDenied During handling of the above exception, another exception occurred: db = None sociallogin_factory = .factory at 0x7f29836fb690> client = request_factory = .RequestFactory object at 0x7f29854a1400> user = , process = 'connect' did_record = False, store_tokens = True settings = @pytest.mark.parametrize("store_tokens", [False, True]) @pytest.mark.parametrize( "process,did_record", [ (AuthProcess.LOGIN, True), (AuthProcess.CONNECT, False), ], ) def test_record_authentication( db, sociallogin_factory, client, request_factory, user, process, did_record, store_tokens, settings, ): settings.SOCIALACCOUNT_STORE_TOKENS = store_tokens sociallogin = sociallogin_factory(provider="unittest-server", uid="123") sociallogin.state["process"] = process sociallogin.token = SocialToken( app=sociallogin.account.get_provider().app, token="123", token_secret="456" ) SocialAccount.objects.create(user=user, uid="123", provider="unittest-server") request = request_factory.get("/") request.user = AnonymousUser() with context.request_context(request): > complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_login.py:134: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:54: in complete_login return connect(request, sociallogin) allauth/socialaccount/internal/flows/connect.py:77: in connect connect_redirect_url = get_adapter().get_connect_redirect_url( allauth/socialaccount/adapter.py:146: in get_connect_redirect_url url = reverse("socialaccount_connections") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________________ test_email_address_created __________________________ settings = db = None, client = setup_sociallogin_flow = .f at 0x7f298418af00> sociallogin_factory = .factory at 0x7f2984949430> def test_email_address_created( settings, db, client, setup_sociallogin_flow, sociallogin_factory ): settings.SOCIALACCOUNT_AUTO_SIGNUP = True settings.ACCOUNT_SIGNUP_FORM_CLASS = None settings.ACCOUNT_EMAIL_VERIFICATION = account_settings.EmailVerificationMethod.NONE sociallogin = sociallogin_factory( email="test@example.com", email_verified=False, username="test" ) > setup_sociallogin_flow(client, sociallogin) allauth/socialaccount/tests/test_signup.py:79: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/test_signup.py:26: in f resp = complete_social_login(request, sociallogin) allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:103: in process_signup resp = complete_social_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:108: in complete_social_signup return complete_signup( allauth/account/internal/flows/signup.py:72: in complete_signup return perform_login(request, login) allauth/account/internal/flows/login.py:83: in perform_login return resume_login(request, login) allauth/account/internal/flows/login.py:92: in resume_login response = ctrl.handle() allauth/account/stages.py:104: in handle stages = self.get_stages() allauth/account/stages.py:96: in get_stages cls = import_callable(path) allauth/utils.py:151: in import_callable ret = import_attribute(path_or_callable) allauth/utils.py:145: in import_attribute ret = getattr(importlib.import_module(pkg), attr) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError __________________ test_email_address_clash_username_required __________________ db = None, client = settings = email_address_clash = ._email_address_clash at 0x7f29861059b0> def test_email_address_clash_username_required( db, client, settings, email_address_clash ): """Test clash on both username and email""" settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = True settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.SOCIALACCOUNT_AUTO_SIGNUP = True > request, resp = email_address_clash("test", "test@example.com") allauth/socialaccount/tests/test_signup.py:97: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/test_signup.py:63: in _email_address_clash resp = complete_social_login(request, sociallogin) allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:88: in process_signup resp = redirect_to_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:26: in redirect_to_signup return headed_redirect_response("socialaccount_signup") allauth/core/internal/httpkit.py:106: in headed_redirect_response return HttpResponseRedirect(reverse(viewname)) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_email_address_clash_username_not_required ________________ db = None settings = email_address_clash = ._email_address_clash at 0x7f2984faca90> def test_email_address_clash_username_not_required(db, settings, email_address_clash): """Test clash while username is not required""" settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.SOCIALACCOUNT_AUTO_SIGNUP = True > request, resp = email_address_clash("test", "test@example.com") allauth/socialaccount/tests/test_signup.py:119: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/test_signup.py:63: in _email_address_clash resp = complete_social_login(request, sociallogin) allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:88: in process_signup resp = redirect_to_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:26: in redirect_to_signup return headed_redirect_response("socialaccount_signup") allauth/core/internal/httpkit.py:106: in headed_redirect_response return HttpResponseRedirect(reverse(viewname)) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_email_address_clash_username_auto_signup _________________ db = None settings = email_address_clash = ._email_address_clash at 0x7f2984facb40> def test_email_address_clash_username_auto_signup(db, settings, email_address_clash): settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.SOCIALACCOUNT_AUTO_SIGNUP = True # Clash on username, but auto signup still works > request, resp = email_address_clash("test", "other@example.com") allauth/socialaccount/tests/test_signup.py:141: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/test_signup.py:63: in _email_address_clash resp = complete_social_login(request, sociallogin) allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:103: in process_signup resp = complete_social_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:108: in complete_social_signup return complete_signup( allauth/account/internal/flows/signup.py:72: in complete_signup return perform_login(request, login) allauth/account/internal/flows/login.py:83: in perform_login return resume_login(request, login) allauth/account/internal/flows/login.py:92: in resume_login response = ctrl.handle() allauth/account/stages.py:104: in handle stages = self.get_stages() allauth/account/stages.py:96: in get_stages cls = import_callable(path) allauth/utils.py:151: in import_callable ret = import_attribute(path_or_callable) allauth/utils.py:145: in import_attribute ret = getattr(importlib.import_module(pkg), attr) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/mfa/stages.py:5: in from allauth.mfa.webauthn.internal.flows import did_use_passwordless_login allauth/mfa/webauthn/internal/flows.py:22: in from allauth.mfa.webauthn.internal import auth _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_populate_username_in_blacklist ______________________ db = None settings = request_factory = .RequestFactory object at 0x7f29851a7230> def test_populate_username_in_blacklist(db, settings, request_factory): settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_USERNAME_BLACKLIST = ["username", "username1", "username2"] settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = True settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.SOCIALACCOUNT_AUTO_SIGNUP = True request = request_factory.get("/accounts/twitter/login/callback/") request.user = AnonymousUser() User = get_user_model() user = User() setattr(user, account_settings.USER_MODEL_USERNAME_FIELD, "username") setattr( user, account_settings.USER_MODEL_EMAIL_FIELD, "username@example.com", ) account = SocialAccount(provider="twitter", uid="123") sociallogin = SocialLogin(user=user, account=account) with context.request_context(request): > complete_social_login(request, sociallogin) allauth/socialaccount/tests/test_signup.py:171: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:88: in process_signup resp = redirect_to_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:26: in redirect_to_signup return headed_redirect_response("socialaccount_signup") allauth/core/internal/httpkit.py:106: in headed_redirect_response return HttpResponseRedirect(reverse(viewname)) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_verified_email_change_at_signup _____________________ db = None, client = settings = sociallogin_factory = .factory at 0x7f29833645c0> setup_sociallogin_flow = .f at 0x7f29833661f0> def test_verified_email_change_at_signup( db, client, settings, sociallogin_factory, setup_sociallogin_flow ): """ Test scenario for when the user changes email at social signup. Current behavior is that both the unverified and verified email are added, and that the user is allowed to pass because he did provide a verified one. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.SOCIALACCOUNT_AUTO_SIGNUP = False sociallogin = sociallogin_factory(email="verified@example.com") > setup_sociallogin_flow(client, sociallogin) allauth/socialaccount/tests/test_signup.py:192: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/test_signup.py:26: in f resp = complete_social_login(request, sociallogin) allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:88: in process_signup resp = redirect_to_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:26: in redirect_to_signup return headed_redirect_response("socialaccount_signup") allauth/core/internal/httpkit.py:106: in headed_redirect_response return HttpResponseRedirect(reverse(viewname)) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________________ test_unverified_email_change_at_signup ____________________ db = None, client = settings = sociallogin_factory = .factory at 0x7f298351ea30> setup_sociallogin_flow = .f at 0x7f298351fcc0> def test_unverified_email_change_at_signup( db, client, settings, sociallogin_factory, setup_sociallogin_flow ): """ Test scenario for when the user changes email at social signup, while his provider did not provide a verified email. In that case, email verification will kick in. Here, both email addresses are added as well. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.SOCIALACCOUNT_AUTO_SIGNUP = False User = get_user_model() sociallogin = sociallogin_factory( email="unverified@example.com", email_verified=False ) > setup_sociallogin_flow(client, sociallogin) allauth/socialaccount/tests/test_signup.py:237: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/test_signup.py:26: in f resp = complete_social_login(request, sociallogin) allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:88: in process_signup resp = redirect_to_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:26: in redirect_to_signup return headed_redirect_response("socialaccount_signup") allauth/core/internal/httpkit.py:106: in headed_redirect_response return HttpResponseRedirect(reverse(viewname)) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_unique_email_validation_signup ______________________ db = None, client = sociallogin_factory = .factory at 0x7f298351c3b0> settings = setup_sociallogin_flow = .f at 0x7f298351fb60> def test_unique_email_validation_signup( db, client, sociallogin_factory, settings, setup_sociallogin_flow ): settings.ACCOUNT_PREVENT_ENUMERATION = False settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.SOCIALACCOUNT_AUTO_SIGNUP = False User = get_user_model() email = "me@example.com" user = User.objects.create(email=email) EmailAddress.objects.create(email=email, user=user, verified=True) sociallogin = sociallogin_factory(email="me@example.com") > setup_sociallogin_flow(client, sociallogin) allauth/socialaccount/tests/test_signup.py:278: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/test_signup.py:26: in f resp = complete_social_login(request, sociallogin) allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:88: in process_signup resp = redirect_to_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:26: in redirect_to_signup return headed_redirect_response("socialaccount_signup") allauth/core/internal/httpkit.py:106: in headed_redirect_response return HttpResponseRedirect(reverse(viewname)) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_social_account_taken_at_signup ______________________ db = None, client = sociallogin_factory = .factory at 0x7f2983564250> settings = setup_sociallogin_flow = .f at 0x7f2983564300> def test_social_account_taken_at_signup( db, client, sociallogin_factory, settings, setup_sociallogin_flow ): """ Test scenario for when the user signs up with a social account and uses email address in that social account. But upon seeing the verification screen, they realize that email address is somehow unusable for them, and so backs up and enters a different email address (and is forced to choose a new username) while providing the same social account token which is owned by their first attempt. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = True settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.SOCIALACCOUNT_AUTO_SIGNUP = False User = get_user_model() sociallogin = sociallogin_factory(email="me1@example.com", email_verified=False) > setup_sociallogin_flow(client, sociallogin) allauth/socialaccount/tests/test_signup.py:312: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/test_signup.py:26: in f resp = complete_social_login(request, sociallogin) allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:88: in process_signup resp = redirect_to_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:26: in redirect_to_signup return headed_redirect_response("socialaccount_signup") allauth/core/internal/httpkit.py:106: in headed_redirect_response return HttpResponseRedirect(reverse(viewname)) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________ test_email_address_required_missing_from_sociallogin _____________ db = None settings = sociallogin_factory = .factory at 0x7f29835664b0> client = setup_sociallogin_flow = .f at 0x7f29835640f0> def test_email_address_required_missing_from_sociallogin( db, settings, sociallogin_factory, client, setup_sociallogin_flow ): """Tests that when the email address is missing from the sociallogin email verification kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.SOCIALACCOUNT_AUTO_SIGNUP = True sociallogin = sociallogin_factory(with_email=False) > resp = setup_sociallogin_flow(client, sociallogin) allauth/socialaccount/tests/test_signup.py:342: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/test_signup.py:26: in f resp = complete_social_login(request, sociallogin) allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:88: in process_signup resp = redirect_to_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:26: in redirect_to_signup return headed_redirect_response("socialaccount_signup") allauth/core/internal/httpkit.py:106: in headed_redirect_response return HttpResponseRedirect(reverse(viewname)) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________ test_email_address_conflict_at_social_signup_form _______________ db = None settings = user_factory = .factory at 0x7f2983564eb0> sociallogin_factory = .factory at 0x7f2983566350> client = setup_sociallogin_flow = .f at 0x7f2983565170> mailoutbox = [] def test_email_address_conflict_at_social_signup_form( db, settings, user_factory, sociallogin_factory, client, setup_sociallogin_flow, mailoutbox, ): """Tests that when an already existing email is given at the social signup form, enumeration preventation kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.SOCIALACCOUNT_AUTO_SIGNUP = True user = user_factory() sociallogin = sociallogin_factory(with_email=False) > resp = setup_sociallogin_flow(client, sociallogin) allauth/socialaccount/tests/test_signup.py:371: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/test_signup.py:26: in f resp = complete_social_login(request, sociallogin) allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:88: in process_signup resp = redirect_to_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:26: in redirect_to_signup return headed_redirect_response("socialaccount_signup") allauth/core/internal/httpkit.py:106: in headed_redirect_response return HttpResponseRedirect(reverse(viewname)) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_email_address_conflict_during_auto_signup ________________ db = None settings = user_factory = .factory at 0x7f2982fb5900> sociallogin_factory = .factory at 0x7f2982fb4f60> client = , mailoutbox = [] setup_sociallogin_flow = .f at 0x7f2982fb41a0> def test_email_address_conflict_during_auto_signup( db, settings, user_factory, sociallogin_factory, client, mailoutbox, setup_sociallogin_flow, ): """Tests that when an already existing email is received from the provider, enumeration preventation kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "mandatory" settings.SOCIALACCOUNT_AUTO_SIGNUP = True user = user_factory() sociallogin = sociallogin_factory(email=user.email, with_email=True) > resp = setup_sociallogin_flow(client, sociallogin) allauth/socialaccount/tests/test_signup.py:402: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/test_signup.py:26: in f resp = complete_social_login(request, sociallogin) allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:84: in process_signup auto_signup, resp = process_auto_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:73: in process_auto_signup resp = prevent_enumeration(request, email) allauth/account/internal/flows/signup.py:16: in prevent_enumeration adapter.send_account_already_exists_mail(email) allauth/account/adapter.py:607: in send_account_already_exists_mail signup_url = flows.signup.get_signup_url(context.request) allauth/account/internal/flows/signup.py:45: in get_signup_url url = build_absolute_uri(request, reverse("account_signup")) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ test_email_address_conflict_removes_conflicting_email _____________ db = None settings = user_factory = .factory at 0x7f29836c7ab0> sociallogin_factory = .factory at 0x7f29836c5640> client = , mailoutbox = [] setup_sociallogin_flow = .f at 0x7f29836c7320> def test_email_address_conflict_removes_conflicting_email( db, settings, user_factory, sociallogin_factory, client, mailoutbox, setup_sociallogin_flow, ): """Tests that when an already existing email is given at the social signup form, enumeration preventation kicks in. """ settings.ACCOUNT_EMAIL_REQUIRED = True settings.ACCOUNT_UNIQUE_EMAIL = True settings.ACCOUNT_USERNAME_REQUIRED = False settings.ACCOUNT_AUTHENTICATION_METHOD = "email" settings.ACCOUNT_EMAIL_VERIFICATION = "optional" settings.SOCIALACCOUNT_AUTO_SIGNUP = True settings.SOCIALACCOUNT_EMAIL_AUTHENTICATION = False user = user_factory(email_verified=False) sociallogin = sociallogin_factory(email=user.email, email_verified=False) > resp = setup_sociallogin_flow(client, sociallogin) allauth/socialaccount/tests/test_signup.py:430: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/test_signup.py:26: in f resp = complete_social_login(request, sociallogin) allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: in complete_login return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:88: in process_signup resp = redirect_to_signup(request, sociallogin) allauth/socialaccount/internal/flows/signup.py:26: in redirect_to_signup return headed_redirect_response("socialaccount_signup") allauth/core/internal/httpkit.py:106: in headed_redirect_response return HttpResponseRedirect(reverse(viewname)) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________________ test_signup_closed ______________________________ request = sociallogin = raises = False def complete_login(request, sociallogin, raises=False): try: pre_social_login(request, sociallogin) process = sociallogin.state.get("process") if process == AuthProcess.REDIRECT: return _redirect(request, sociallogin) elif process == AuthProcess.CONNECT: if raises: do_connect(request, sociallogin) else: return connect(request, sociallogin) else: > return _authenticate(request, sociallogin) allauth/socialaccount/internal/flows/login.py:56: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/internal/flows/login.py:83: in _authenticate ret = process_signup(request, sociallogin) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ request = sociallogin = def process_signup(request, sociallogin): if not get_adapter().is_open_for_signup(request, sociallogin): > raise SignupClosedException() E allauth.core.exceptions.SignupClosedException allauth/socialaccount/internal/flows/signup.py:83: SignupClosedException During handling of the above exception, another exception occurred: settings = db = None, client = setup_sociallogin_flow = .f at 0x7f2983abe350> sociallogin_factory = .factory at 0x7f2983abe980> def test_signup_closed( settings, db, client, setup_sociallogin_flow, sociallogin_factory, ): sociallogin = sociallogin_factory( email="test@example.com", email_verified=False, username="test" ) with patch( "allauth.socialaccount.adapter.DefaultSocialAccountAdapter.is_open_for_signup" ) as iofs: iofs.return_value = False > resp = setup_sociallogin_flow(client, sociallogin) allauth/socialaccount/tests/test_signup.py:456: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/tests/test_signup.py:26: in f resp = complete_social_login(request, sociallogin) allauth/socialaccount/helpers.py:67: in complete_social_login return flows.login.complete_login(request, sociallogin) allauth/socialaccount/internal/flows/login.py:60: in complete_login return render( /usr/lib/python3.14/site-packages/django/shortcuts.py:25: in render content = loader.render_to_string(template_name, context, request, using=using) /usr/lib/python3.14/site-packages/django/template/loader.py:62: in render_to_string return template.render(context, request) /usr/lib/python3.14/site-packages/django/template/backends/django.py:107: in render return self.template.render(context) /usr/lib/python3.14/site-packages/django/template/base.py:171: in render return self._render(context) /usr/lib/python3.14/site-packages/django/test/utils.py:114: in instrumented_test_render return self.nodelist.render(context) /usr/lib/python3.14/site-packages/django/template/base.py:1016: in render return SafeString("".join([node.render_annotated(context) for node in self])) /usr/lib/python3.14/site-packages/django/template/base.py:977: in render_annotated return self.render(context) /usr/lib/python3.14/site-packages/django/template/loader_tags.py:159: in render return compiled_parent._render(context) /usr/lib/python3.14/site-packages/django/test/utils.py:114: in instrumented_test_render return self.nodelist.render(context) /usr/lib/python3.14/site-packages/django/template/base.py:1016: in render return SafeString("".join([node.render_annotated(context) for node in self])) /usr/lib/python3.14/site-packages/django/template/base.py:977: in render_annotated return self.render(context) /usr/lib/python3.14/site-packages/django/template/loader_tags.py:159: in render return compiled_parent._render(context) /usr/lib/python3.14/site-packages/django/test/utils.py:114: in instrumented_test_render return self.nodelist.render(context) /usr/lib/python3.14/site-packages/django/template/base.py:1016: in render return SafeString("".join([node.render_annotated(context) for node in self])) /usr/lib/python3.14/site-packages/django/template/base.py:977: in render_annotated return self.render(context) /usr/lib/python3.14/site-packages/django/template/loader_tags.py:159: in render return compiled_parent._render(context) /usr/lib/python3.14/site-packages/django/test/utils.py:114: in instrumented_test_render return self.nodelist.render(context) /usr/lib/python3.14/site-packages/django/template/base.py:1016: in render return SafeString("".join([node.render_annotated(context) for node in self])) /usr/lib/python3.14/site-packages/django/template/base.py:977: in render_annotated return self.render(context) /usr/lib/python3.14/site-packages/django/template/loader_tags.py:65: in render result = block.nodelist.render(context) /usr/lib/python3.14/site-packages/django/template/base.py:1016: in render return SafeString("".join([node.render_annotated(context) for node in self])) /usr/lib/python3.14/site-packages/django/template/base.py:977: in render_annotated return self.render(context) /usr/lib/python3.14/site-packages/django/template/defaulttags.py:327: in render return nodelist.render(context) /usr/lib/python3.14/site-packages/django/template/base.py:1016: in render return SafeString("".join([node.render_annotated(context) for node in self])) /usr/lib/python3.14/site-packages/django/template/base.py:977: in render_annotated return self.render(context) /usr/lib/python3.14/site-packages/django/template/defaulttags.py:480: in render url = reverse(view_name, args=args, kwargs=kwargs, current_app=current_app) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ BasicTests.test_templatetag_with_csrf_failure _________________ self = def test_templatetag_with_csrf_failure(self): # Generate a fictitious GET request from allauth.socialaccount.models import SocialApp app = SocialApp.objects.create(provider="google") if app_settings.SITES_ENABLED: from django.contrib.sites.models import Site app.sites.add(Site.objects.get_current()) request = self.factory.get("/tests/test_403_csrf.html") # Simulate a CSRF failure by calling the View directly # This template is using the `provider_login_url` templatetag > response = csrf.csrf_failure(request, template_name="tests/test_403_csrf.html") allauth/tests.py:210: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/views/csrf.py:70: in csrf_failure body = t.render(request=request) /usr/lib/python3.14/site-packages/django/template/backends/django.py:107: in render return self.template.render(context) /usr/lib/python3.14/site-packages/django/template/base.py:171: in render return self._render(context) /usr/lib/python3.14/site-packages/django/test/utils.py:114: in instrumented_test_render return self.nodelist.render(context) /usr/lib/python3.14/site-packages/django/template/base.py:1016: in render return SafeString("".join([node.render_annotated(context) for node in self])) /usr/lib/python3.14/site-packages/django/template/base.py:977: in render_annotated return self.render(context) /usr/lib/python3.14/site-packages/django/template/library.py:321: in render output = self.func(*resolved_args, **resolved_kwargs) allauth/socialaccount/templatetags/socialaccount.py:40: in provider_login_url return provider.get_login_url(request, **query) allauth/socialaccount/providers/oauth2/provider.py:25: in get_login_url url = reverse(self.id + "_login") /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ______________________________ test_overall_flow _______________________________ user = user_password = '8c4e3421-38a1-481b-a20a-3c4baa541b38' def test_overall_flow(user, user_password): firefox = Client(HTTP_USER_AGENT="Mozilla Firefox") nyxt = Client(HTTP_USER_AGENT="Nyxt") for client in [firefox, nyxt]: resp = client.post( > reverse("account_login"), {"login": user.username, "password": user_password}, ) allauth/usersessions/tests/test_views.py:14: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_change_password_updates_user_session[True] ________________ settings = logout_on_passwd_change = True client = user = user_password = '0e0643ac-e6cf-4c80-bce7-f1e26d3a8c73' password_factory = .f at 0x7f29835c7a00> @pytest.mark.parametrize("logout_on_passwd_change", [True, False]) def test_change_password_updates_user_session( settings, logout_on_passwd_change, client, user, user_password, password_factory ): settings.ACCOUNT_LOGOUT_ON_PASSWORD_CHANGE = logout_on_passwd_change resp = client.post( > reverse("account_login"), {"login": user.username, "password": user_password}, ) allauth/usersessions/tests/test_views.py:43: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_change_password_updates_user_session[False] _______________ settings = logout_on_passwd_change = False client = user = user_password = '59d6e693-2486-4d26-8c8c-1b596b8e5756' password_factory = .f at 0x7f29835c5d20> @pytest.mark.parametrize("logout_on_passwd_change", [True, False]) def test_change_password_updates_user_session( settings, logout_on_passwd_change, client, user, user_password, password_factory ): settings.ACCOUNT_LOGOUT_ON_PASSWORD_CHANGE = logout_on_passwd_change resp = client.post( > reverse("account_login"), {"login": user.username, "password": user_password}, ) allauth/usersessions/tests/test_views.py:43: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________________ test_accounts_redirect_async_ctx _______________________ self = loop = <_UnixSelectorEventLoop running=False closed=False debug=False> exc_info = (, AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'"), ) task_context = [] func = args = (functools.partial(, , AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'")),) kwargs = {}, __traceback_hide__ = True def thread_handler(self, loop, exc_info, task_context, func, *args, **kwargs): """ Wraps the sync application with exception handling. """ __traceback_hide__ = True # noqa: F841 # Set the threadlocal for AsyncToSync self.threadlocal.main_event_loop = loop self.threadlocal.main_event_loop_pid = os.getpid() self.threadlocal.task_context = task_context # Run the function # If we have an exception, run the function inside the except block # after raising it so exc_info is correctly populated. if exc_info[1]: try: > raise exc_info[1] /usr/lib/python3.14/site-packages/asgiref/sync.py:518: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:42: in inner response = await get_response(request) /usr/lib/python3.14/site-packages/django/core/handlers/base.py:235: in _get_response_async callback, callback_args, callback_kwargs = self.resolve_request(request) /usr/lib/python3.14/site-packages/django/core/handlers/base.py:313: in resolve_request resolver_match = resolver.resolve(request.path_info) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:666: in resolve for pattern in self.url_patterns: /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError During handling of the above exception, another exception occurred: self = loop = <_UnixSelectorEventLoop running=False closed=False debug=False> exc_info = (, AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'"), ) task_context = [] func = args = (functools.partial(, , AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'")),) kwargs = {}, __traceback_hide__ = True def thread_handler(self, loop, exc_info, task_context, func, *args, **kwargs): """ Wraps the sync application with exception handling. """ __traceback_hide__ = True # noqa: F841 # Set the threadlocal for AsyncToSync self.threadlocal.main_event_loop = loop self.threadlocal.main_event_loop_pid = os.getpid() self.threadlocal.task_context = task_context # Run the function # If we have an exception, run the function inside the except block # after raising it so exc_info is correctly populated. if exc_info[1]: try: > raise exc_info[1] /usr/lib/python3.14/site-packages/asgiref/sync.py:518: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:42: in inner response = await get_response(request) allauth/account/middleware.py:26: in middleware response = await get_response(request) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:44: in inner response = await sync_to_async( /usr/lib/python3.14/site-packages/asgiref/sync.py:468: in __call__ ret = await asyncio.shield(exec_coro) /usr/lib64/python3.14/concurrent/futures/thread.py:86: in run result = ctx.run(self.task) /usr/lib64/python3.14/concurrent/futures/thread.py:73: in run return fn(*args, **kwargs) /usr/lib/python3.14/site-packages/asgiref/sync.py:520: in thread_handler return func(*args, **kwargs) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:141: in response_for_exception response = handle_uncaught_exception( /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:185: in handle_uncaught_exception callback = resolver.resolve_error_handler(500) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:732: in resolve_error_handler callback = getattr(self.urlconf_module, "handler%s" % view_type, None) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError During handling of the above exception, another exception occurred: self = loop = <_UnixSelectorEventLoop running=False closed=False debug=False> exc_info = (, AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'"), ) task_context = [] func = args = (functools.partial(, , AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'")),) kwargs = {}, __traceback_hide__ = True def thread_handler(self, loop, exc_info, task_context, func, *args, **kwargs): """ Wraps the sync application with exception handling. """ __traceback_hide__ = True # noqa: F841 # Set the threadlocal for AsyncToSync self.threadlocal.main_event_loop = loop self.threadlocal.main_event_loop_pid = os.getpid() self.threadlocal.task_context = task_context # Run the function # If we have an exception, run the function inside the except block # after raising it so exc_info is correctly populated. if exc_info[1]: try: > raise exc_info[1] /usr/lib/python3.14/site-packages/asgiref/sync.py:518: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:42: in inner response = await get_response(request) /usr/lib/python3.14/site-packages/django/utils/deprecation.py:136: in __acall__ response = response or await self.get_response(request) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:44: in inner response = await sync_to_async( /usr/lib/python3.14/site-packages/asgiref/sync.py:468: in __call__ ret = await asyncio.shield(exec_coro) /usr/lib64/python3.14/concurrent/futures/thread.py:86: in run result = ctx.run(self.task) /usr/lib64/python3.14/concurrent/futures/thread.py:73: in run return fn(*args, **kwargs) /usr/lib/python3.14/site-packages/asgiref/sync.py:520: in thread_handler return func(*args, **kwargs) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:141: in response_for_exception response = handle_uncaught_exception( /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:185: in handle_uncaught_exception callback = resolver.resolve_error_handler(500) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:732: in resolve_error_handler callback = getattr(self.urlconf_module, "handler%s" % view_type, None) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError During handling of the above exception, another exception occurred: self = loop = <_UnixSelectorEventLoop running=False closed=False debug=False> exc_info = (, AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'"), ) task_context = [] func = args = (functools.partial(, , AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'")),) kwargs = {}, __traceback_hide__ = True def thread_handler(self, loop, exc_info, task_context, func, *args, **kwargs): """ Wraps the sync application with exception handling. """ __traceback_hide__ = True # noqa: F841 # Set the threadlocal for AsyncToSync self.threadlocal.main_event_loop = loop self.threadlocal.main_event_loop_pid = os.getpid() self.threadlocal.task_context = task_context # Run the function # If we have an exception, run the function inside the except block # after raising it so exc_info is correctly populated. if exc_info[1]: try: > raise exc_info[1] /usr/lib/python3.14/site-packages/asgiref/sync.py:518: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:42: in inner response = await get_response(request) /usr/lib/python3.14/site-packages/django/utils/deprecation.py:136: in __acall__ response = response or await self.get_response(request) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:44: in inner response = await sync_to_async( /usr/lib/python3.14/site-packages/asgiref/sync.py:468: in __call__ ret = await asyncio.shield(exec_coro) /usr/lib64/python3.14/concurrent/futures/thread.py:86: in run result = ctx.run(self.task) /usr/lib64/python3.14/concurrent/futures/thread.py:73: in run return fn(*args, **kwargs) /usr/lib/python3.14/site-packages/asgiref/sync.py:520: in thread_handler return func(*args, **kwargs) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:141: in response_for_exception response = handle_uncaught_exception( /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:185: in handle_uncaught_exception callback = resolver.resolve_error_handler(500) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:732: in resolve_error_handler callback = getattr(self.urlconf_module, "handler%s" % view_type, None) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError During handling of the above exception, another exception occurred: self = loop = <_UnixSelectorEventLoop running=False closed=False debug=False> exc_info = (, AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'"), ) task_context = [] func = args = (functools.partial(, , AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'")),) kwargs = {}, __traceback_hide__ = True def thread_handler(self, loop, exc_info, task_context, func, *args, **kwargs): """ Wraps the sync application with exception handling. """ __traceback_hide__ = True # noqa: F841 # Set the threadlocal for AsyncToSync self.threadlocal.main_event_loop = loop self.threadlocal.main_event_loop_pid = os.getpid() self.threadlocal.task_context = task_context # Run the function # If we have an exception, run the function inside the except block # after raising it so exc_info is correctly populated. if exc_info[1]: try: > raise exc_info[1] /usr/lib/python3.14/site-packages/asgiref/sync.py:518: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:42: in inner response = await get_response(request) /usr/lib/python3.14/site-packages/django/utils/deprecation.py:136: in __acall__ response = response or await self.get_response(request) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:44: in inner response = await sync_to_async( /usr/lib/python3.14/site-packages/asgiref/sync.py:468: in __call__ ret = await asyncio.shield(exec_coro) /usr/lib64/python3.14/concurrent/futures/thread.py:86: in run result = ctx.run(self.task) /usr/lib64/python3.14/concurrent/futures/thread.py:73: in run return fn(*args, **kwargs) /usr/lib/python3.14/site-packages/asgiref/sync.py:520: in thread_handler return func(*args, **kwargs) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:141: in response_for_exception response = handle_uncaught_exception( /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:185: in handle_uncaught_exception callback = resolver.resolve_error_handler(500) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:732: in resolve_error_handler callback = getattr(self.urlconf_module, "handler%s" % view_type, None) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError During handling of the above exception, another exception occurred: self = loop = <_UnixSelectorEventLoop running=False closed=False debug=False> exc_info = (, AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'"), ) task_context = [] func = args = (functools.partial(, , AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'")),) kwargs = {}, __traceback_hide__ = True def thread_handler(self, loop, exc_info, task_context, func, *args, **kwargs): """ Wraps the sync application with exception handling. """ __traceback_hide__ = True # noqa: F841 # Set the threadlocal for AsyncToSync self.threadlocal.main_event_loop = loop self.threadlocal.main_event_loop_pid = os.getpid() self.threadlocal.task_context = task_context # Run the function # If we have an exception, run the function inside the except block # after raising it so exc_info is correctly populated. if exc_info[1]: try: > raise exc_info[1] /usr/lib/python3.14/site-packages/asgiref/sync.py:518: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:42: in inner response = await get_response(request) /usr/lib/python3.14/site-packages/django/utils/deprecation.py:136: in __acall__ response = response or await self.get_response(request) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:44: in inner response = await sync_to_async( /usr/lib/python3.14/site-packages/asgiref/sync.py:468: in __call__ ret = await asyncio.shield(exec_coro) /usr/lib64/python3.14/concurrent/futures/thread.py:86: in run result = ctx.run(self.task) /usr/lib64/python3.14/concurrent/futures/thread.py:73: in run return fn(*args, **kwargs) /usr/lib/python3.14/site-packages/asgiref/sync.py:520: in thread_handler return func(*args, **kwargs) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:141: in response_for_exception response = handle_uncaught_exception( /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:185: in handle_uncaught_exception callback = resolver.resolve_error_handler(500) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:732: in resolve_error_handler callback = getattr(self.urlconf_module, "handler%s" % view_type, None) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError During handling of the above exception, another exception occurred: self = loop = <_UnixSelectorEventLoop running=False closed=False debug=False> exc_info = (, AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'"), ) task_context = [] func = args = (functools.partial(, , AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'")),) kwargs = {}, __traceback_hide__ = True def thread_handler(self, loop, exc_info, task_context, func, *args, **kwargs): """ Wraps the sync application with exception handling. """ __traceback_hide__ = True # noqa: F841 # Set the threadlocal for AsyncToSync self.threadlocal.main_event_loop = loop self.threadlocal.main_event_loop_pid = os.getpid() self.threadlocal.task_context = task_context # Run the function # If we have an exception, run the function inside the except block # after raising it so exc_info is correctly populated. if exc_info[1]: try: > raise exc_info[1] /usr/lib/python3.14/site-packages/asgiref/sync.py:518: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:42: in inner response = await get_response(request) /usr/lib/python3.14/site-packages/django/utils/deprecation.py:136: in __acall__ response = response or await self.get_response(request) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:44: in inner response = await sync_to_async( /usr/lib/python3.14/site-packages/asgiref/sync.py:468: in __call__ ret = await asyncio.shield(exec_coro) /usr/lib64/python3.14/concurrent/futures/thread.py:86: in run result = ctx.run(self.task) /usr/lib64/python3.14/concurrent/futures/thread.py:73: in run return fn(*args, **kwargs) /usr/lib/python3.14/site-packages/asgiref/sync.py:520: in thread_handler return func(*args, **kwargs) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:141: in response_for_exception response = handle_uncaught_exception( /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:185: in handle_uncaught_exception callback = resolver.resolve_error_handler(500) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:732: in resolve_error_handler callback = getattr(self.urlconf_module, "handler%s" % view_type, None) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError During handling of the above exception, another exception occurred: self = loop = <_UnixSelectorEventLoop running=False closed=False debug=False> exc_info = (, AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'"), ) task_context = [] func = args = (functools.partial(, , AttributeError("module 'fido2.features' has no attribute 'webauthn_json_mapping'")),) kwargs = {}, __traceback_hide__ = True def thread_handler(self, loop, exc_info, task_context, func, *args, **kwargs): """ Wraps the sync application with exception handling. """ __traceback_hide__ = True # noqa: F841 # Set the threadlocal for AsyncToSync self.threadlocal.main_event_loop = loop self.threadlocal.main_event_loop_pid = os.getpid() self.threadlocal.task_context = task_context # Run the function # If we have an exception, run the function inside the except block # after raising it so exc_info is correctly populated. if exc_info[1]: try: > raise exc_info[1] /usr/lib/python3.14/site-packages/asgiref/sync.py:518: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:42: in inner response = await get_response(request) /usr/lib/python3.14/site-packages/django/utils/deprecation.py:136: in __acall__ response = response or await self.get_response(request) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:44: in inner response = await sync_to_async( /usr/lib/python3.14/site-packages/asgiref/sync.py:468: in __call__ ret = await asyncio.shield(exec_coro) /usr/lib64/python3.14/concurrent/futures/thread.py:86: in run result = ctx.run(self.task) /usr/lib64/python3.14/concurrent/futures/thread.py:73: in run return fn(*args, **kwargs) /usr/lib/python3.14/site-packages/asgiref/sync.py:520: in thread_handler return func(*args, **kwargs) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:141: in response_for_exception response = handle_uncaught_exception( /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:185: in handle_uncaught_exception callback = resolver.resolve_error_handler(500) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:732: in resolve_error_handler callback = getattr(self.urlconf_module, "handler%s" % view_type, None) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError During handling of the above exception, another exception occurred: user = , db = None @skip_django_lt_5 @pytest.mark.asyncio @pytest.mark.django_db(transaction=True) async def test_accounts_redirect_async_ctx(user, db): aclient = AsyncClient() await aclient.aforce_login(user) > resp = await aclient.get("/accounts/") allauth/account/tests/test_middleware.py:38: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/test/client.py:1481: in get response = await super().get( /usr/lib/python3.14/site-packages/django/test/client.py:1439: in request response = await self.handler(scope) /usr/lib/python3.14/site-packages/django/test/client.py:241: in __call__ response = await self.get_response_async(request) /usr/lib/python3.14/site-packages/django/core/handlers/base.py:162: in get_response_async response = await self._middleware_chain(request) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:44: in inner response = await sync_to_async( /usr/lib/python3.14/site-packages/asgiref/sync.py:468: in __call__ ret = await asyncio.shield(exec_coro) /usr/lib64/python3.14/concurrent/futures/thread.py:86: in run result = ctx.run(self.task) /usr/lib64/python3.14/concurrent/futures/thread.py:73: in run return fn(*args, **kwargs) /usr/lib/python3.14/site-packages/asgiref/sync.py:520: in thread_handler return func(*args, **kwargs) /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:141: in response_for_exception response = handle_uncaught_exception( /usr/lib/python3.14/site-packages/django/core/handlers/exception.py:185: in handle_uncaught_exception callback = resolver.resolve_error_handler(500) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:732: in resolve_error_handler callback = getattr(self.urlconf_module, "handler%s" % view_type, None) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_secure_admin_login_skips_admin_login_next ________________ client = def test_secure_admin_login_skips_admin_login_next(client): """ Test that we're not using 'next=/admin/login%2Fnext=/foo' """ > resp = client.get(reverse("admin:login") + "?next=/foo") allauth/account/tests/test_decorators.py:25: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_auth_password_input_error[app] ______________________ headless_reverse = .rev at 0x7f2982fb7ed0> client = def test_auth_password_input_error(headless_reverse, client): resp = client.post( > headless_reverse("headless:account:login"), data={}, content_type="application/json", ) allauth/headless/account/tests/test_login.py:8: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_auth_password_input_error[browser] ____________________ headless_reverse = .rev at 0x7f2982fb6610> client = def test_auth_password_input_error(headless_reverse, client): resp = client.post( > headless_reverse("headless:account:login"), data={}, content_type="application/json", ) allauth/headless/account/tests/test_login.py:8: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_password_reset_flow_wrong_key[app-get] __________________ client = password_factory = .f at 0x7f2983141220> headless_reverse = .rev at 0x7f2983142400> method = 'get' @pytest.mark.parametrize("method", ["get", "post"]) def test_password_reset_flow_wrong_key( client, password_factory, headless_reverse, method ): password = password_factory() if method == "get": resp = client.get( > headless_reverse("headless:account:reset_password"), HTTP_X_PASSWORD_RESET_KEY="wrong", ) allauth/headless/account/tests/test_reset_password.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_password_reset_flow_wrong_key[app-post] _________________ client = password_factory = .f at 0x7f2982ecd430> headless_reverse = .rev at 0x7f2982ecdd20> method = 'post' @pytest.mark.parametrize("method", ["get", "post"]) def test_password_reset_flow_wrong_key( client, password_factory, headless_reverse, method ): password = password_factory() if method == "get": resp = client.get( headless_reverse("headless:account:reset_password"), HTTP_X_PASSWORD_RESET_KEY="wrong", ) else: resp = client.post( > headless_reverse("headless:account:reset_password"), data={ "key": "wrong", "password": password, }, content_type="application/json", ) allauth/headless/account/tests/test_reset_password.py:77: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_password_reset_flow_wrong_key[browser-get] ________________ client = password_factory = .f at 0x7f2982b990c0> headless_reverse = .rev at 0x7f2982b9bab0> method = 'get' @pytest.mark.parametrize("method", ["get", "post"]) def test_password_reset_flow_wrong_key( client, password_factory, headless_reverse, method ): password = password_factory() if method == "get": resp = client.get( > headless_reverse("headless:account:reset_password"), HTTP_X_PASSWORD_RESET_KEY="wrong", ) allauth/headless/account/tests/test_reset_password.py:72: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _______________ test_password_reset_flow_wrong_key[browser-post] _______________ client = password_factory = .f at 0x7f29832a7cc0> headless_reverse = .rev at 0x7f2982c2cbf0> method = 'post' @pytest.mark.parametrize("method", ["get", "post"]) def test_password_reset_flow_wrong_key( client, password_factory, headless_reverse, method ): password = password_factory() if method == "get": resp = client.get( headless_reverse("headless:account:reset_password"), HTTP_X_PASSWORD_RESET_KEY="wrong", ) else: resp = client.post( > headless_reverse("headless:account:reset_password"), data={ "key": "wrong", "password": password, }, content_type="application/json", ) allauth/headless/account/tests/test_reset_password.py:77: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/headless/conftest.py:16: in rev return reverse(viewname, **kwargs) /usr/lib/python3.14/site-packages/django/urls/base.py:64: in reverse app_list = resolver.app_dict[ns] /usr/lib/python3.14/site-packages/django/urls/resolvers.py:637: in app_dict self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _________________ test_login_required_views[mfa_activate_totp] _________________ client = url_name = 'mfa_activate_totp' @pytest.mark.parametrize( "url_name", ( "mfa_activate_totp", "mfa_index", "mfa_deactivate_totp", ), ) def test_login_required_views(client, url_name): > resp = client.get(reverse(url_name)) allauth/mfa/base/tests/test_views.py:46: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________ test_login_required_views[mfa_index] _____________________ client = url_name = 'mfa_index' @pytest.mark.parametrize( "url_name", ( "mfa_activate_totp", "mfa_index", "mfa_deactivate_totp", ), ) def test_login_required_views(client, url_name): > resp = client.get(reverse(url_name)) allauth/mfa/base/tests/test_views.py:46: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________________ test_login_required_views[mfa_deactivate_totp] ________________ client = url_name = 'mfa_deactivate_totp' @pytest.mark.parametrize( "url_name", ( "mfa_activate_totp", "mfa_index", "mfa_deactivate_totp", ), ) def test_login_required_views(client, url_name): > resp = client.get(reverse(url_name)) allauth/mfa/base/tests/test_views.py:46: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ____________ test_get_passkey_login_challenge_redirects_if_not_ajax ____________ client = def test_get_passkey_login_challenge_redirects_if_not_ajax(client): > resp = client.get(reverse("mfa_login_webauthn")) allauth/mfa/webauthn/tests/test_views.py:56: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ________ test_build_saml_config_without_metadata_url[provider_config0] _________ rf = provider_config = {'idp': {'entity_id': 'dummy', 'slo_url': 'https://idp.saml.org/slo/', 'sso_url': 'https://idp.org/sso/', 'x509cert': 'cert'}} @pytest.mark.parametrize( "provider_config", [ { "idp": { "entity_id": "dummy", "sso_url": "https://idp.org/sso/", "slo_url": "https://idp.saml.org/slo/", "x509cert": "cert", } }, ], ) def test_build_saml_config_without_metadata_url(rf, provider_config): request = rf.get("/") > config = build_saml_config(request, provider_config, "org") allauth/socialaccount/providers/saml/tests.py:189: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/saml/utils.py:148: in build_saml_config saml_config["sp"] = build_sp_config(request, provider_config, org) allauth/socialaccount/providers/saml/utils.py:41: in build_sp_config acs_url = request.build_absolute_uri(reverse("saml_acs", args=[org])) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_build_saml_config[provider_config0] ___________________ rf = provider_config = {'idp': {'entity_id': 'dummy', 'metadata_url': 'https://idp.org/sso/'}} @pytest.mark.parametrize( "provider_config", [ { "idp": { "entity_id": "dummy", "metadata_url": "https://idp.org/sso/", } }, { "idp": { "entity_id": "dummy", "metadata_url": "https://idp.org/sso/", }, "sp": {"entity_id": "dummy-sp-entity-id"}, }, ], ) def test_build_saml_config(rf, provider_config): request = rf.get("/") with patch( "onelogin.saml2.idp_metadata_parser.OneLogin_Saml2_IdPMetadataParser.parse_remote" ) as parse_mock: parse_mock.return_value = { "idp": { "entityId": "dummy", "singleSignOnService": {"url": "https://idp.org/sso/"}, "singleLogoutService": {"url": "https://idp.saml.org/slo/"}, "x509cert": "cert", } } > config = build_saml_config(request, provider_config, "org") allauth/socialaccount/providers/saml/tests.py:227: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/saml/utils.py:148: in build_saml_config saml_config["sp"] = build_sp_config(request, provider_config, org) allauth/socialaccount/providers/saml/utils.py:41: in build_sp_config acs_url = request.build_absolute_uri(reverse("saml_acs", args=[org])) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError ___________________ test_build_saml_config[provider_config1] ___________________ rf = provider_config = {'idp': {'entity_id': 'dummy', 'metadata_url': 'https://idp.org/sso/'}, 'sp': {'entity_id': 'dummy-sp-entity-id'}} @pytest.mark.parametrize( "provider_config", [ { "idp": { "entity_id": "dummy", "metadata_url": "https://idp.org/sso/", } }, { "idp": { "entity_id": "dummy", "metadata_url": "https://idp.org/sso/", }, "sp": {"entity_id": "dummy-sp-entity-id"}, }, ], ) def test_build_saml_config(rf, provider_config): request = rf.get("/") with patch( "onelogin.saml2.idp_metadata_parser.OneLogin_Saml2_IdPMetadataParser.parse_remote" ) as parse_mock: parse_mock.return_value = { "idp": { "entityId": "dummy", "singleSignOnService": {"url": "https://idp.org/sso/"}, "singleLogoutService": {"url": "https://idp.saml.org/slo/"}, "x509cert": "cert", } } > config = build_saml_config(request, provider_config, "org") allauth/socialaccount/providers/saml/tests.py:227: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ allauth/socialaccount/providers/saml/utils.py:148: in build_saml_config saml_config["sp"] = build_sp_config(request, provider_config, org) allauth/socialaccount/providers/saml/utils.py:41: in build_sp_config acs_url = request.build_absolute_uri(reverse("saml_acs", args=[org])) /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError _____________________________ test_login_cancelled _____________________________ client = def test_login_cancelled(client): > resp = client.get(reverse("socialaccount_login_cancelled")) allauth/socialaccount/tests/test_login.py:100: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python3.14/site-packages/django/urls/base.py:98: in reverse resolved_url = resolver._reverse_with_prefix(view, prefix, *args, **kwargs) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:749: in _reverse_with_prefix self._populate() /usr/lib/python3.14/site-packages/django/urls/resolvers.py:548: in _populate for url_pattern in reversed(self.url_patterns): /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:718: in url_patterns patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module) /usr/lib/python3.14/site-packages/django/utils/functional.py:47: in __get__ res = instance.__dict__[self.name] = self.func(instance) /usr/lib/python3.14/site-packages/django/urls/resolvers.py:711: in urlconf_module return import_module(self.urlconf_name) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? tests/regular/urls.py:14: in path("_allauth/", include("allauth.headless.urls")), /usr/lib/python3.14/site-packages/django/urls/conf.py:39: in include urlconf_module = import_module(urlconf_module) /usr/lib64/python3.14/importlib/__init__.py:88: in import_module return _bootstrap._gcd_import(name[level:], package, level) :1398: in _gcd_import ??? :1371: in _find_and_load ??? :1342: in _find_and_load_unlocked ??? :938: in _load_unlocked ??? :762: in exec_module ??? :491: in _call_with_frames_removed ??? allauth/headless/urls.py:68: in (build_urlpatterns(Client.BROWSER), "headless"), allauth/headless/urls.py:35: in build_urlpatterns from allauth.headless.mfa import urls as mfa_urls allauth/headless/mfa/urls.py:3: in from allauth.headless.mfa import views allauth/headless/mfa/views.py:18: in from allauth.headless.mfa.inputs import ( allauth/headless/mfa/inputs.py:7: in from allauth.mfa.webauthn.forms import ( allauth/mfa/webauthn/forms.py:12: in from allauth.mfa.webauthn.internal import auth, flows _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ from typing import Any, Dict, List, Optional from django.contrib.auth import get_user_model import fido2.features from fido2.server import Fido2Server from fido2.utils import websafe_decode from fido2.webauthn import ( AttestedCredentialData, AuthenticationResponse, AuthenticatorData, PublicKeyCredentialRpEntity, PublicKeyCredentialUserEntity, RegistrationResponse, ResidentKeyRequirement, UserVerificationRequirement, ) from allauth.account.utils import url_str_to_user_pk from allauth.core import context from allauth.mfa import app_settings from allauth.mfa.adapter import get_adapter from allauth.mfa.models import Authenticator > fido2.features.webauthn_json_mapping.enabled = True E AttributeError: module 'fido2.features' has no attribute 'webauthn_json_mapping' allauth/mfa/webauthn/internal/auth.py:26: AttributeError --------------------------- Captured stderr teardown --------------------------- Destroying test database for alias 'default'... =============================== warnings summary =============================== ../../../../../usr/lib/python3.14/site-packages/openid/oidutil.py:106 /usr/lib/python3.14/site-packages/openid/oidutil.py:106: DeprecationWarning: defusedxml.cElementTree is deprecated, import from defusedxml.ElementTree instead. ElementTree = __import__(mod_name, None, None, ['unused']) allauth/account/tests/test_email_verification.py:26 /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/allauth/account/tests/test_email_verification.py:26: PytestCollectionWarning: cannot collect test class 'TestEmailVerificationAdapter' because it has a __init__ constructor (from: allauth/account/tests/test_email_verification.py) class TestEmailVerificationAdapter(DefaultAccountAdapter): allauth/socialaccount/providers/openid/forms.py:6 /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/allauth/socialaccount/providers/openid/forms.py:6: RemovedInDjango60Warning: The default scheme will be changed from 'http' to 'https' in Django 6.0. Pass the forms.URLField.assume_scheme argument to silence this warning, or set the FORMS_URLFIELD_ASSUME_HTTPS transitional setting to True to opt into using 'https' as the new default scheme. openid = forms.URLField( allauth/socialaccount/tests/test_adapter.py:14 /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/allauth/socialaccount/tests/test_adapter.py:14: PytestCollectionWarning: cannot collect test class 'TestSocialAccountAdapter' because it has a __init__ constructor (from: allauth/socialaccount/tests/test_adapter.py) class TestSocialAccountAdapter(DefaultSocialAccountAdapter): allauth/socialaccount/providers/evernote/tests.py::EvernoteTests::test_auto_signup /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/allauth/socialaccount/tests/__init__.py:96: UserWarning: Cannot test provider evernote, no oauth mock warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) allauth/socialaccount/providers/google/tests.py::GoogleTests::test_login_with_pkce_disabled allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_login_with_pkce_disabled /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/allauth/socialaccount/tests/__init__.py:239: UserWarning: Cannot test provider google, no oauth mock warnings.warn( allauth/socialaccount/providers/google/tests.py::GoogleTests::test_login_with_pkce_enabled allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_login_with_pkce_enabled /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/allauth/socialaccount/tests/__init__.py:260: UserWarning: Cannot test provider google, no oauth mock warnings.warn( allauth/socialaccount/providers/pocket/tests.py::PocketOAuthTests::test_auto_signup /builddir/build/BUILD/python-django-allauth-65.3.0-build/django-allauth/allauth/socialaccount/tests/__init__.py:96: UserWarning: Cannot test provider pocket, no oauth mock warnings.warn("Cannot test provider %s, no oauth mock" % self.provider.id) -- Docs: https://docs.pytest.org/en/stable/how-to/capture-warnings.html =========================== short test summary info ============================ FAILED allauth/account/tests/test_adapter.py::test_adapter_pre_login - Attrib... FAILED allauth/account/tests/test_ajax.py::test_ajax_headers[headers0-False] FAILED allauth/account/tests/test_ajax.py::test_ajax_headers[headers1-True] FAILED allauth/account/tests/test_ajax.py::test_ajax_headers[headers2-True] FAILED allauth/account/tests/test_ajax.py::test_ajax_password_reset - Attribu... FAILED allauth/account/tests/test_ajax.py::test_ajax_login_fail - AttributeEr... FAILED allauth/account/tests/test_ajax.py::test_ajax_login_success - Attribut... FAILED allauth/account/tests/test_change_email.py::test_ajax_get - AttributeE... FAILED allauth/account/tests/test_change_email.py::test_ajax_add - AttributeE... FAILED allauth/account/tests/test_change_email.py::test_ajax_add_invalid - At... FAILED allauth/account/tests/test_change_email.py::test_ajax_remove_primary FAILED allauth/account/tests/test_change_email.py::test_remove_secondary - At... FAILED allauth/account/tests/test_change_email.py::test_set_primary_unverified FAILED allauth/account/tests/test_change_email.py::test_set_primary - Attribu... FAILED allauth/account/tests/test_change_email.py::test_verify - AttributeErr... FAILED allauth/account/tests/test_change_email.py::test_verify_unknown_email FAILED allauth/account/tests/test_change_email.py::test_add_with_two_limiter FAILED allauth/account/tests/test_change_email.py::test_add_with_none_limiter FAILED allauth/account/tests/test_change_email.py::test_add_with_zero_limiter FAILED allauth/account/tests/test_change_email.py::test_delete_email_changes_user_email FAILED allauth/account/tests/test_change_email.py::test_delete_email_wipes_user_email FAILED allauth/account/tests/test_change_email.py::test_change_email - Attrib... FAILED allauth/account/tests/test_change_email.py::test_add - AttributeError:... FAILED allauth/account/tests/test_change_email.py::test_add_with_reauthentication FAILED allauth/account/tests/test_change_email.py::test_add_not_allowed[False] FAILED allauth/account/tests/test_change_email.py::test_add_not_allowed[True] FAILED allauth/account/tests/test_change_email.py::test_add_not_allowed[strict] FAILED allauth/account/tests/test_change_email.py::test_remove_email[email-pri@ma.il-secondary_emails0-pri@ma.il-False] FAILED allauth/account/tests/test_change_email.py::test_remove_email[email-pri@ma.il-secondary_emails1-sec@ma.il-True] FAILED allauth/account/tests/test_change_email.py::test_remove_email[email-pri@ma.il-secondary_emails2-pri@ma.il-False] FAILED allauth/account/tests/test_change_email.py::test_remove_email[username-pri@ma.il-secondary_emails3-pri@ma.il-False] FAILED allauth/account/tests/test_change_email.py::test_remove_email[username-pri@ma.il-secondary_emails4-sec@ma.il-True] FAILED allauth/account/tests/test_change_email.py::test_remove_email[username-pri@ma.il-secondary_emails5-pri@ma.il-True] FAILED allauth/account/tests/test_change_email.py::test_remove_email[username_email-pri@ma.il-secondary_emails6-pri@ma.il-False] FAILED allauth/account/tests/test_change_email.py::test_remove_email[username_email-pri@ma.il-secondary_emails7-sec@ma.il-True] FAILED allauth/account/tests/test_change_email.py::test_remove_email[username_email-pri@ma.il-secondary_emails8-pri@ma.il-True] FAILED allauth/account/tests/test_change_email.py::test_dont_lookup_invalid_email[valid@email.org-True] FAILED allauth/account/tests/test_change_email.py::test_dont_lookup_invalid_email[not-an-email-False] FAILED allauth/account/tests/test_change_email.py::test_add_requires_reauthentication FAILED allauth/account/tests/test_change_email.py::test_remove_requires_reauthentication FAILED allauth/account/tests/test_change_email.py::test_set_primary_requires_reauthentication FAILED allauth/account/tests/test_change_password.py::test_change_unusable_password_redirects_to_set FAILED allauth/account/tests/test_change_password.py::test_set_usable_password_redirects_to_change FAILED allauth/account/tests/test_change_password.py::test_set_password[False--redirect_chain0] FAILED allauth/account/tests/test_change_password.py::test_set_password[False-/foo-redirect_chain1] FAILED allauth/account/tests/test_change_password.py::test_set_password[True--redirect_chain2] FAILED allauth/account/tests/test_change_password.py::test_set_password[True-/foo-redirect_chain3] FAILED allauth/account/tests/test_change_password.py::test_change_password[False--redirect_chain0] FAILED allauth/account/tests/test_change_password.py::test_change_password[False-/foo-redirect_chain1] FAILED allauth/account/tests/test_change_password.py::test_change_password[True--redirect_chain2] FAILED allauth/account/tests/test_change_password.py::test_change_password[True-/foo-redirect_chain3] FAILED allauth/account/tests/test_decorators.py::test_verified_email_required FAILED allauth/account/tests/test_decorators.py::test_secure_admin_login_denies_regular_users FAILED allauth/account/tests/test_decorators.py::test_secure_admin_login_passes_staff FAILED allauth/account/tests/test_email_verification.py::test_login_on_verification[None--/accounts/profile/] FAILED allauth/account/tests/test_email_verification.py::test_login_on_verification[None-?next=/foo-/foo] FAILED allauth/account/tests/test_email_verification.py::test_login_on_verification[allauth.account.tests.test_email_verification.TestEmailVerificationAdapter--/foobar] FAILED allauth/account/tests/test_email_verification.py::test_email_verification_failed FAILED allauth/account/tests/test_email_verification.py::test_email_verification_mandatory FAILED allauth/account/tests/test_email_verification.py::test_optional_email_verification FAILED allauth/account/tests/test_email_verification.py::test_email_verification_hmac FAILED allauth/account/tests/test_email_verification.py::test_email_verification_hmac_timeout FAILED allauth/account/tests/test_email_verification.py::test_verify_email_with_another_user_logged_in FAILED allauth/account/tests/test_email_verification.py::test_verify_email_with_same_user_logged_in FAILED allauth/account/tests/test_email_verification.py::test_verify_logs_out_user FAILED allauth/account/tests/test_email_verification.py::test_email_verification_login_redirect FAILED allauth/account/tests/test_email_verification.py::test_email_verification_redirect_url FAILED allauth/account/tests/test_email_verification_by_code.py::test_signup[-/accounts/profile/] FAILED allauth/account/tests/test_email_verification_by_code.py::test_signup[?next=/foo-/foo] FAILED allauth/account/tests/test_email_verification_by_code.py::test_signup_prevent_enumeration FAILED allauth/account/tests/test_email_verification_by_code.py::test_add_or_change_email[False] FAILED allauth/account/tests/test_email_verification_by_code.py::test_add_or_change_email[True] FAILED allauth/account/tests/test_email_verification_by_code.py::test_email_verification_login_redirect FAILED allauth/account/tests/test_email_verification_by_code.py::test_email_verification_rate_limits FAILED allauth/account/tests/test_login.py::LoginTests::test_account_authenticated_login_redirects_is_false FAILED allauth/account/tests/test_login.py::LoginTests::test_ajax_password_change FAILED allauth/account/tests/test_login.py::LoginTests::test_login_failed_attempts_exceeded FAILED allauth/account/tests/test_login.py::LoginTests::test_login_failed_attempts_exceeded_cleared_on_password_reset FAILED allauth/account/tests/test_login.py::LoginTests::test_login_inactive_account FAILED allauth/account/tests/test_login.py::LoginTests::test_login_unverified_account_mandatory FAILED allauth/account/tests/test_login.py::LoginTests::test_login_unverified_account_optional FAILED allauth/account/tests/test_login.py::LoginTests::test_login_using_unverified_email_address_is_prohibited FAILED allauth/account/tests/test_login.py::LoginTests::test_redirect_when_authenticated FAILED allauth/account/tests/test_login.py::LoginTests::test_username_containing_at FAILED allauth/account/tests/test_login.py::test_login_password_forgotten_link_present FAILED allauth/account/tests/test_login.py::test_login_while_authenticated - ... FAILED allauth/account/tests/test_login.py::test_login_page - AttributeError:... FAILED allauth/account/tests/test_login_by_code.py::test_login_by_code - Attr... FAILED allauth/account/tests/test_login_by_code.py::test_login_by_code_max_attempts FAILED allauth/account/tests/test_login_by_code.py::test_login_by_code_unknown_user FAILED allauth/account/tests/test_login_by_code.py::test_login_by_code_required[True-True] FAILED allauth/account/tests/test_login_by_code.py::test_login_by_code_required[setting1-True] FAILED allauth/account/tests/test_login_by_code.py::test_login_by_code_required[setting2-False] FAILED allauth/account/tests/test_login_by_code.py::test_login_by_code_redirect FAILED allauth/account/tests/test_logout.py::LogoutTests::test_logout_view_on_get FAILED allauth/account/tests/test_logout.py::LogoutTests::test_logout_view_on_post FAILED allauth/account/tests/test_models.py::test_add_new_email - AttributeEr... FAILED allauth/account/tests/test_ratelimit.py::test_case_insensitive_password_reset FAILED allauth/account/tests/test_reauthentication.py::test_user_with_mfa_only[False-True-expected_method_urlnames0] FAILED allauth/account/tests/test_reauthentication.py::test_user_with_mfa_only[True-True-expected_method_urlnames1] FAILED allauth/account/tests/test_reauthentication.py::test_user_with_mfa_only[True-False-expected_method_urlnames2] FAILED allauth/account/tests/test_reauthentication.py::test_reauthentication FAILED allauth/account/tests/test_reset_password.py::test_reset_password_unknown_account FAILED allauth/account/tests/test_reset_password.py::test_reset_password_unknown_account_disabled FAILED allauth/account/tests/test_reset_password.py::test_reset_password_next_url[-expected_location0] FAILED allauth/account/tests/test_reset_password.py::test_reset_password_next_url[?next=/foo-/foo] FAILED allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_password_forgotten_no_username_hint FAILED allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_password_forgotten_username_hint FAILED allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_password_reset_ACCOUNT_LOGIN_ON_PASSWORD_RESET FAILED allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_password_reset_flow_with_another_user_logged_in FAILED allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_password_reset_flow_with_email_changed FAILED allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_password_reset_flow_with_empty_session FAILED allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_password_reset_get FAILED allauth/account/tests/test_reset_password.py::ResetPasswordTests::test_set_password_not_allowed FAILED allauth/account/tests/test_reset_password.py::test_password_reset_flow FAILED allauth/account/tests/test_reset_password.py::test_reset_password_from_key_next_url[None-expected_location0] FAILED allauth/account/tests/test_reset_password.py::test_reset_password_from_key_next_url[/foo-/foo] FAILED allauth/account/tests/test_security.py::test_user_email_unicode_collision FAILED allauth/account/tests/test_security.py::test_user_email_domain_unicode_collision FAILED allauth/account/tests/test_signup.py::SignupTests::test_django_password_validation FAILED allauth/account/tests/test_signup.py::SignupTests::test_signup_email_twice FAILED allauth/account/tests/test_signup.py::SignupTests::test_signup_other_email_verified_externally FAILED allauth/account/tests/test_signup.py::SignupTests::test_signup_password_twice_form_error FAILED allauth/account/tests/test_signup.py::SignupTests::test_signup_same_email_verified_externally FAILED allauth/account/tests/test_signup.py::test_prevent_enumeration_with_mandatory_verification FAILED allauth/account/tests/test_signup.py::test_prevent_enumeration_off - A... FAILED allauth/account/tests/test_signup.py::test_prevent_enumeration_strictly FAILED allauth/account/tests/test_signup.py::test_prevent_enumeration_on - At... FAILED allauth/account/tests/test_signup.py::test_get_initial_with_valid_email FAILED allauth/account/tests/test_signup.py::test_signup_user_model_no_email FAILED allauth/account/tests/test_signup.py::test_email_lower_case - Attribut... FAILED allauth/account/tests/test_signup.py::test_does_not_create_user_when_honeypot_filled_out FAILED allauth/account/tests/test_signup.py::test_create_user_when_honeypot_not_filled_out FAILED allauth/account/tests/test_utils.py::UtilsTests::test_email_escaping FAILED allauth/account/tests/test_utils.py::test_redirect_noreversematch - At... FAILED allauth/headless/account/tests/test_change_email.py::test_list_email[app] FAILED allauth/headless/account/tests/test_change_email.py::test_list_email[browser] FAILED allauth/headless/account/tests/test_change_email.py::test_remove_email[app] FAILED allauth/headless/account/tests/test_change_email.py::test_remove_email[browser] FAILED allauth/headless/account/tests/test_change_email.py::test_add_email[app] FAILED allauth/headless/account/tests/test_change_email.py::test_add_email[browser] FAILED allauth/headless/account/tests/test_change_email.py::test_change_primary[app] FAILED allauth/headless/account/tests/test_change_email.py::test_change_primary[browser] FAILED allauth/headless/account/tests/test_change_email.py::test_resend_verification[app] FAILED allauth/headless/account/tests/test_change_email.py::test_resend_verification[browser] FAILED allauth/headless/account/tests/test_change_email.py::test_email_rate_limit[app] FAILED allauth/headless/account/tests/test_change_email.py::test_email_rate_limit[browser] FAILED allauth/headless/account/tests/test_change_email.py::test_resend_verification_rate_limit[app] FAILED allauth/headless/account/tests/test_change_email.py::test_resend_verification_rate_limit[browser] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[app-True-request_data0-response_data0-400] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[app-True-request_data1-response_data1-200] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[app-True-request_data2-response_data2-400] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[app-True-request_data3-response_data3-400] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[app-True-request_data4-response_data4-400] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[app-True-request_data5-response_data5-400] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[app-False-request_data6-response_data6-200] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[app-False-request_data7-response_data7-200] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[browser-True-request_data0-response_data0-400] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[browser-True-request_data1-response_data1-200] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[browser-True-request_data2-response_data2-400] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[browser-True-request_data3-response_data3-400] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[browser-True-request_data4-response_data4-400] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[browser-True-request_data5-response_data5-400] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[browser-False-request_data6-response_data6-200] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password[browser-False-request_data7-response_data7-200] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password_rate_limit[app] FAILED allauth/headless/account/tests/test_change_password.py::test_change_password_rate_limit[browser] FAILED allauth/headless/account/tests/test_email_verification.py::test_verify_email_other_user[app] FAILED allauth/headless/account/tests/test_email_verification.py::test_verify_email_other_user[browser] FAILED allauth/headless/account/tests/test_email_verification.py::test_auth_unverified_email[app] FAILED allauth/headless/account/tests/test_email_verification.py::test_auth_unverified_email[browser] FAILED allauth/headless/account/tests/test_email_verification.py::test_verify_email_bad_key[app] FAILED allauth/headless/account/tests/test_email_verification.py::test_verify_email_bad_key[browser] FAILED allauth/headless/account/tests/test_email_verification_by_code.py::test_email_verification_rate_limits_login[app] FAILED allauth/headless/account/tests/test_email_verification_by_code.py::test_email_verification_rate_limits_login[browser] FAILED allauth/headless/account/tests/test_email_verification_by_code.py::test_email_verification_rate_limits_submitting_codes[app-GET] FAILED allauth/headless/account/tests/test_email_verification_by_code.py::test_email_verification_rate_limits_submitting_codes[app-POST] FAILED allauth/headless/account/tests/test_email_verification_by_code.py::test_email_verification_rate_limits_submitting_codes[browser-GET] FAILED allauth/headless/account/tests/test_email_verification_by_code.py::test_email_verification_rate_limits_submitting_codes[browser-POST] FAILED allauth/headless/account/tests/test_login.py::test_auth_password_bad_password[app] FAILED allauth/headless/account/tests/test_login.py::test_auth_password_bad_password[browser] FAILED allauth/headless/account/tests/test_login.py::test_auth_password_success[app] FAILED allauth/headless/account/tests/test_login.py::test_auth_password_success[browser] FAILED allauth/headless/account/tests/test_login.py::test_auth_password_user_inactive[app-False-401] FAILED allauth/headless/account/tests/test_login.py::test_auth_password_user_inactive[app-True-200] FAILED allauth/headless/account/tests/test_login.py::test_auth_password_user_inactive[browser-False-401] FAILED allauth/headless/account/tests/test_login.py::test_auth_password_user_inactive[browser-True-200] FAILED allauth/headless/account/tests/test_login.py::test_login_failed_rate_limit[app] FAILED allauth/headless/account/tests/test_login.py::test_login_failed_rate_limit[browser] FAILED allauth/headless/account/tests/test_login.py::test_login_rate_limit[app] FAILED allauth/headless/account/tests/test_login.py::test_login_rate_limit[browser] FAILED allauth/headless/account/tests/test_login.py::test_login_already_logged_in[app] FAILED allauth/headless/account/tests/test_login.py::test_login_already_logged_in[browser] FAILED allauth/headless/account/tests/test_login_by_code.py::test_login_by_code[app] FAILED allauth/headless/account/tests/test_login_by_code.py::test_login_by_code[browser] FAILED allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_rate_limit[app] FAILED allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_rate_limit[browser] FAILED allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_max_attemps[app] FAILED allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_max_attemps[browser] FAILED allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_required[app] FAILED allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_required[browser] FAILED allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_expired[app] FAILED allauth/headless/account/tests/test_login_by_code.py::test_login_by_code_expired[browser] FAILED allauth/headless/account/tests/test_reauthentication.py::test_reauthenticate[app] FAILED allauth/headless/account/tests/test_reauthentication.py::test_reauthenticate[browser] FAILED allauth/headless/account/tests/test_reauthentication.py::test_reauthenticate_rate_limit[app] FAILED allauth/headless/account/tests/test_reauthentication.py::test_reauthenticate_rate_limit[browser] FAILED allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow[app] FAILED allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow[browser] FAILED allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow_unknown_user[app] FAILED allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow_unknown_user[browser] FAILED allauth/headless/account/tests/test_reset_password.py::test_reset_password_rate_limit[app] FAILED allauth/headless/account/tests/test_reset_password.py::test_reset_password_rate_limit[browser] FAILED allauth/headless/account/tests/test_reset_password.py::test_password_reset_key_rate_limit[app] FAILED allauth/headless/account/tests/test_reset_password.py::test_password_reset_key_rate_limit[browser] FAILED allauth/headless/account/tests/test_session.py::test_app_session_gone FAILED allauth/headless/account/tests/test_session.py::test_logout[app] - Att... FAILED allauth/headless/account/tests/test_session.py::test_logout[browser] FAILED allauth/headless/account/tests/test_session.py::test_logout_no_token FAILED allauth/headless/account/tests/test_signup.py::test_signup[app] - Attr... FAILED allauth/headless/account/tests/test_signup.py::test_signup[browser] - ... FAILED allauth/headless/account/tests/test_signup.py::test_signup_with_email_verification[app] FAILED allauth/headless/account/tests/test_signup.py::test_signup_with_email_verification[browser] FAILED allauth/headless/account/tests/test_signup.py::test_signup_prevent_enumeration[app] FAILED allauth/headless/account/tests/test_signup.py::test_signup_prevent_enumeration[browser] FAILED allauth/headless/account/tests/test_signup.py::test_signup_rate_limit[app] FAILED allauth/headless/account/tests/test_signup.py::test_signup_rate_limit[browser] FAILED allauth/headless/account/tests/test_signup.py::test_signup_closed[app] FAILED allauth/headless/account/tests/test_signup.py::test_signup_closed[browser] FAILED allauth/headless/account/tests/test_signup.py::test_signup_while_logged_in[app] FAILED allauth/headless/account/tests/test_signup.py::test_signup_while_logged_in[browser] FAILED allauth/headless/base/tests/test_views.py::test_config[app] - Attribut... FAILED allauth/headless/base/tests/test_views.py::test_config[browser] - Attr... FAILED allauth/headless/mfa/tests/test_recovery_codes.py::test_get_recovery_codes_requires_reauth[app] FAILED allauth/headless/mfa/tests/test_recovery_codes.py::test_get_recovery_codes_requires_reauth[browser] FAILED allauth/headless/mfa/tests/test_recovery_codes.py::test_get_recovery_codes[app] FAILED allauth/headless/mfa/tests/test_recovery_codes.py::test_get_recovery_codes[browser] FAILED allauth/headless/mfa/tests/test_recovery_codes.py::test_generate_recovery_codes[app] FAILED allauth/headless/mfa/tests/test_recovery_codes.py::test_generate_recovery_codes[browser] FAILED allauth/headless/mfa/tests/test_totp.py::test_get_totp_not_active[app-False] FAILED allauth/headless/mfa/tests/test_totp.py::test_get_totp_not_active[app-True] FAILED allauth/headless/mfa/tests/test_totp.py::test_get_totp_not_active[browser-False] FAILED allauth/headless/mfa/tests/test_totp.py::test_get_totp_not_active[browser-True] FAILED allauth/headless/mfa/tests/test_totp.py::test_get_totp[app] - Attribut... FAILED allauth/headless/mfa/tests/test_totp.py::test_get_totp[browser] - Attr... FAILED allauth/headless/mfa/tests/test_totp.py::test_deactivate_totp[app] - A... FAILED allauth/headless/mfa/tests/test_totp.py::test_deactivate_totp[browser] FAILED allauth/headless/mfa/tests/test_totp.py::test_activate_totp[app-False] FAILED allauth/headless/mfa/tests/test_totp.py::test_activate_totp[app-True] FAILED allauth/headless/mfa/tests/test_totp.py::test_activate_totp[browser-False] FAILED allauth/headless/mfa/tests/test_totp.py::test_activate_totp[browser-True] FAILED allauth/headless/mfa/tests/test_views.py::test_auth_unverified_email_and_mfa[app] FAILED allauth/headless/mfa/tests/test_views.py::test_auth_unverified_email_and_mfa[browser] FAILED allauth/headless/mfa/tests/test_views.py::test_dangling_mfa_is_logged_out[app] FAILED allauth/headless/mfa/tests/test_views.py::test_dangling_mfa_is_logged_out[browser] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_passkey_login[app] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_passkey_login[browser] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_passkey_login_get_options[app] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_passkey_login_get_options[browser] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_reauthenticate[app] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_reauthenticate[browser] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_update_authenticator[app] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_update_authenticator[browser] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_delete_authenticator[app] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_delete_authenticator[browser] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_add_authenticator[app-False] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_add_authenticator[app-True] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_add_authenticator[browser-False] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_add_authenticator[browser-True] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_2fa_login[app] - Att... FAILED allauth/headless/mfa/tests/test_webauthn.py::test_2fa_login[browser] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_passkey_signup[app] FAILED allauth/headless/mfa/tests/test_webauthn.py::test_passkey_signup[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_bad_redirect[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_bad_redirect[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_valid_redirect[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_valid_redirect[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_manage_providers[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_manage_providers[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_disconnect_bad_request[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_disconnect_bad_request[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_valid_token[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_valid_token[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_invalid_token[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_invalid_token[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_auth_error_no_headless_request[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_auth_error_no_headless_request[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_auth_error_headless_request[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_auth_error_headless_request[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_auth_error_no_headless_state_request_headless_only[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_auth_error_no_headless_state_request_headless_only[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_auth_error_headless_state_request_headless_only[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_auth_error_headless_state_request_headless_only[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_token_signup_closed[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_token_signup_closed[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_provider_signup[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_provider_signup[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_signup_closed[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_signup_closed[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_connect[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_connect[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_connect_reauthentication_required[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_connect_reauthentication_required[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_connect_already_connected[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_connect_already_connected[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_token_connect[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_token_connect[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_token_connect_already_connected[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_token_connect_already_connected[browser] FAILED allauth/headless/socialaccount/tests/test_views.py::test_provider_signup_not_pending[app] FAILED allauth/headless/socialaccount/tests/test_views.py::test_provider_signup_not_pending[browser] FAILED allauth/headless/tests/test_tokens.py::test_access_token[app] - Attrib... FAILED allauth/headless/tests/test_tokens.py::test_access_token[browser] - At... FAILED allauth/headless/usersessions/tests/test_views.py::test_flow[app] - At... FAILED allauth/headless/usersessions/tests/test_views.py::test_flow[browser] FAILED allauth/mfa/base/tests/test_views.py::test_reauthentication - Attribut... FAILED allauth/mfa/base/tests/test_views.py::test_index - AttributeError: mod... FAILED allauth/mfa/base/tests/test_views.py::test_add_email_not_allowed - Att... FAILED allauth/mfa/recovery_codes/tests/test_views.py::test_generate_recovery_codes_require_other_authenticator FAILED allauth/mfa/recovery_codes/tests/test_views.py::test_download_recovery_codes FAILED allauth/mfa/recovery_codes/tests/test_views.py::test_view_recovery_codes FAILED allauth/mfa/recovery_codes/tests/test_views.py::test_generate_recovery_codes FAILED allauth/mfa/recovery_codes/tests/test_views.py::test_recovery_codes_login FAILED allauth/mfa/totp/tests/test_views.py::test_activate_totp_with_incorrect_code FAILED allauth/mfa/totp/tests/test_views.py::test_activate_totp_with_unverified_email[get-False] FAILED allauth/mfa/totp/tests/test_views.py::test_activate_totp_with_unverified_email[post-False] FAILED allauth/mfa/totp/tests/test_views.py::test_activate_totp_success - Att... FAILED allauth/mfa/totp/tests/test_views.py::test_deactivate_totp_success - A... FAILED allauth/mfa/totp/tests/test_views.py::test_user_without_totp_deactivate_totp FAILED allauth/mfa/totp/tests/test_views.py::test_user_with_totp_activate_totp FAILED allauth/mfa/totp/tests/test_views.py::test_totp_login - AttributeError... FAILED allauth/mfa/totp/tests/test_views.py::test_totp_login_rate_limit - Att... FAILED allauth/mfa/totp/tests/test_views.py::test_cannot_deactivate_totp - At... FAILED allauth/mfa/totp/tests/test_views.py::test_totp_code_reuse - Attribute... FAILED allauth/mfa/totp/tests/test_views.py::test_totp_stage_expires - Attrib... FAILED allauth/mfa/webauthn/tests/test_views.py::test_passkey_login - Attribu... FAILED allauth/mfa/webauthn/tests/test_views.py::test_reauthenticate - Attrib... FAILED allauth/mfa/webauthn/tests/test_views.py::test_get_passkey_login_challenge FAILED allauth/mfa/webauthn/tests/test_views.py::test_invalid_passkey_login FAILED allauth/mfa/webauthn/tests/test_views.py::test_rename_key - AttributeE... FAILED allauth/mfa/webauthn/tests/test_views.py::test_remove_key - AttributeE... FAILED allauth/mfa/webauthn/tests/test_views.py::test_add_key[False] - Attrib... FAILED allauth/mfa/webauthn/tests/test_views.py::test_add_key[True] - Attribu... FAILED allauth/mfa/webauthn/tests/test_views.py::test_list_keys - AttributeEr... FAILED allauth/mfa/webauthn/tests/test_views.py::test_add_with_unverified_email[get-False] FAILED allauth/mfa/webauthn/tests/test_views.py::test_add_with_unverified_email[post-False] FAILED allauth/mfa/webauthn/tests/test_views.py::test_passkey_signup - Attrib... FAILED allauth/mfa/webauthn/tests/test_views.py::test_webauthn_login - Attrib... FAILED allauth/socialaccount/providers/agave/tests.py::AgaveTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/agave/tests.py::AgaveTests::test_account_tokens FAILED allauth/socialaccount/providers/agave/tests.py::AgaveTests::test_authentication_error FAILED allauth/socialaccount/providers/agave/tests.py::AgaveTests::test_login FAILED allauth/socialaccount/providers/agave/tests.py::AgaveTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/agave/tests.py::AgaveTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/amazon/tests.py::AmazonTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/amazon/tests.py::AmazonTests::test_account_tokens FAILED allauth/socialaccount/providers/amazon/tests.py::AmazonTests::test_authentication_error FAILED allauth/socialaccount/providers/amazon/tests.py::AmazonTests::test_login FAILED allauth/socialaccount/providers/amazon/tests.py::AmazonTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/amazon/tests.py::AmazonTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_account_tokens FAILED allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_authentication_error FAILED allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_login FAILED allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_oauth2_adapter_raises_if_domain_settings_is_missing FAILED allauth/socialaccount/providers/amazon_cognito/tests.py::AmazonCognitoTestCase::test_saves_email_as_verified_if_email_is_verified_in_cognito FAILED allauth/socialaccount/providers/angellist/tests.py::AngelListTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/angellist/tests.py::AngelListTests::test_account_tokens FAILED allauth/socialaccount/providers/angellist/tests.py::AngelListTests::test_authentication_error FAILED allauth/socialaccount/providers/angellist/tests.py::AngelListTests::test_login FAILED allauth/socialaccount/providers/angellist/tests.py::AngelListTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/angellist/tests.py::AngelListTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/apple/tests.py::AppleTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/apple/tests.py::AppleTests::test_account_tokens FAILED allauth/socialaccount/providers/apple/tests.py::AppleTests::test_apple_finish FAILED allauth/socialaccount/providers/apple/tests.py::AppleTests::test_authentication_error FAILED allauth/socialaccount/providers/apple/tests.py::AppleTests::test_login FAILED allauth/socialaccount/providers/apple/tests.py::AppleTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/apple/tests.py::AppleTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/asana/tests.py::AsanaTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/asana/tests.py::AsanaTests::test_account_tokens FAILED allauth/socialaccount/providers/asana/tests.py::AsanaTests::test_authentication_error FAILED allauth/socialaccount/providers/asana/tests.py::AsanaTests::test_login FAILED allauth/socialaccount/providers/asana/tests.py::AsanaTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/asana/tests.py::AsanaTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/atlassian/tests.py::AtlassianTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/atlassian/tests.py::AtlassianTests::test_account_tokens FAILED allauth/socialaccount/providers/atlassian/tests.py::AtlassianTests::test_authentication_error FAILED allauth/socialaccount/providers/atlassian/tests.py::AtlassianTests::test_login FAILED allauth/socialaccount/providers/atlassian/tests.py::AtlassianTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/atlassian/tests.py::AtlassianTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/auth0/tests.py::Auth0Tests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/auth0/tests.py::Auth0Tests::test_account_tokens FAILED allauth/socialaccount/providers/auth0/tests.py::Auth0Tests::test_authentication_error FAILED allauth/socialaccount/providers/auth0/tests.py::Auth0Tests::test_login FAILED allauth/socialaccount/providers/auth0/tests.py::Auth0Tests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/auth0/tests.py::Auth0Tests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_account_tokens FAILED allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_authentication_error FAILED allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_login FAILED allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/authentiq/tests.py::AuthentiqTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/baidu/tests.py::BaiduTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/baidu/tests.py::BaiduTests::test_account_tokens FAILED allauth/socialaccount/providers/baidu/tests.py::BaiduTests::test_authentication_error FAILED allauth/socialaccount/providers/baidu/tests.py::BaiduTests::test_login FAILED allauth/socialaccount/providers/baidu/tests.py::BaiduTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/baidu/tests.py::BaiduTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/basecamp/tests.py::BasecampTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/basecamp/tests.py::BasecampTests::test_account_tokens FAILED allauth/socialaccount/providers/basecamp/tests.py::BasecampTests::test_authentication_error FAILED allauth/socialaccount/providers/basecamp/tests.py::BasecampTests::test_login FAILED allauth/socialaccount/providers/basecamp/tests.py::BasecampTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/basecamp/tests.py::BasecampTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_account_tokens FAILED allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_authentication_error FAILED allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_extra_data FAILED allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_login FAILED allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/battlenet/tests.py::BattleNetTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_account_tokens FAILED allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_authentication_error FAILED allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_login FAILED allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/bitbucket_oauth2/tests.py::BitbucketOAuth2Tests::test_provider_account FAILED allauth/socialaccount/providers/bitly/tests.py::BitlyTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/bitly/tests.py::BitlyTests::test_account_tokens FAILED allauth/socialaccount/providers/bitly/tests.py::BitlyTests::test_authentication_error FAILED allauth/socialaccount/providers/bitly/tests.py::BitlyTests::test_login FAILED allauth/socialaccount/providers/bitly/tests.py::BitlyTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/bitly/tests.py::BitlyTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/box/tests.py::BoxOAuth2Tests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/box/tests.py::BoxOAuth2Tests::test_account_tokens FAILED allauth/socialaccount/providers/box/tests.py::BoxOAuth2Tests::test_authentication_error FAILED allauth/socialaccount/providers/box/tests.py::BoxOAuth2Tests::test_login FAILED allauth/socialaccount/providers/box/tests.py::BoxOAuth2Tests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/box/tests.py::BoxOAuth2Tests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/cilogon/tests.py::CILogonTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/cilogon/tests.py::CILogonTests::test_account_tokens FAILED allauth/socialaccount/providers/cilogon/tests.py::CILogonTests::test_authentication_error FAILED allauth/socialaccount/providers/cilogon/tests.py::CILogonTests::test_login FAILED allauth/socialaccount/providers/cilogon/tests.py::CILogonTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/cilogon/tests.py::CILogonTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/clever/tests.py::CleverOAuth2Tests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/clever/tests.py::CleverOAuth2Tests::test_account_tokens FAILED allauth/socialaccount/providers/clever/tests.py::CleverOAuth2Tests::test_authentication_error FAILED allauth/socialaccount/providers/clever/tests.py::CleverOAuth2Tests::test_login FAILED allauth/socialaccount/providers/clever/tests.py::CleverOAuth2Tests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/clever/tests.py::CleverOAuth2Tests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/coinbase/tests.py::CoinbaseTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/coinbase/tests.py::CoinbaseTests::test_account_tokens FAILED allauth/socialaccount/providers/coinbase/tests.py::CoinbaseTests::test_authentication_error FAILED allauth/socialaccount/providers/coinbase/tests.py::CoinbaseTests::test_login FAILED allauth/socialaccount/providers/coinbase/tests.py::CoinbaseTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/coinbase/tests.py::CoinbaseTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_account_tokens FAILED allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_authentication_error FAILED allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_login FAILED allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/dataporten/tests.py::DataportenTest::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/daum/tests.py::DaumTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/daum/tests.py::DaumTests::test_account_tokens FAILED allauth/socialaccount/providers/daum/tests.py::DaumTests::test_authentication_error FAILED allauth/socialaccount/providers/daum/tests.py::DaumTests::test_login FAILED allauth/socialaccount/providers/daum/tests.py::DaumTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/daum/tests.py::DaumTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/digitalocean/tests.py::DigitalOceanTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/digitalocean/tests.py::DigitalOceanTests::test_account_tokens FAILED allauth/socialaccount/providers/digitalocean/tests.py::DigitalOceanTests::test_authentication_error FAILED allauth/socialaccount/providers/digitalocean/tests.py::DigitalOceanTests::test_login FAILED allauth/socialaccount/providers/digitalocean/tests.py::DigitalOceanTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/digitalocean/tests.py::DigitalOceanTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/dingtalk/tests.py::DingTalkTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/dingtalk/tests.py::DingTalkTests::test_account_tokens FAILED allauth/socialaccount/providers/dingtalk/tests.py::DingTalkTests::test_authentication_error FAILED allauth/socialaccount/providers/dingtalk/tests.py::DingTalkTests::test_login FAILED allauth/socialaccount/providers/dingtalk/tests.py::DingTalkTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/dingtalk/tests.py::DingTalkTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_account_tokens FAILED allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_authentication_error FAILED allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_display_name FAILED allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_login FAILED allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/discord/tests.py::DiscordTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_account_tokens FAILED allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_authentication_error FAILED allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_display_name FAILED allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_login FAILED allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/discord/tests.py::OldDiscordTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_account_connect FAILED allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_account_tokens FAILED allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_authentication_error FAILED allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_login FAILED allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/disqus/tests.py::DisqusTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/douban/tests.py::DoubanTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/douban/tests.py::DoubanTests::test_account_tokens FAILED allauth/socialaccount/providers/douban/tests.py::DoubanTests::test_authentication_error FAILED allauth/socialaccount/providers/douban/tests.py::DoubanTests::test_login FAILED allauth/socialaccount/providers/douban/tests.py::DoubanTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/douban/tests.py::DoubanTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/doximity/tests.py::DoximityTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/doximity/tests.py::DoximityTests::test_account_tokens FAILED allauth/socialaccount/providers/doximity/tests.py::DoximityTests::test_authentication_error FAILED allauth/socialaccount/providers/doximity/tests.py::DoximityTests::test_login FAILED allauth/socialaccount/providers/doximity/tests.py::DoximityTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/doximity/tests.py::DoximityTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/draugiem/tests.py::DraugiemTests::test_callback FAILED allauth/socialaccount/providers/draugiem/tests.py::DraugiemTests::test_callback_invalid_auth_status FAILED allauth/socialaccount/providers/draugiem/tests.py::DraugiemTests::test_callback_no_auth_status FAILED allauth/socialaccount/providers/draugiem/tests.py::DraugiemTests::test_login_redirect FAILED allauth/socialaccount/providers/drip/tests.py::DripTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/drip/tests.py::DripTests::test_account_tokens FAILED allauth/socialaccount/providers/drip/tests.py::DripTests::test_authentication_error FAILED allauth/socialaccount/providers/drip/tests.py::DripTests::test_login FAILED allauth/socialaccount/providers/drip/tests.py::DripTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/drip/tests.py::DripTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/dropbox/tests.py::DropboxOAuth2Tests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/dropbox/tests.py::DropboxOAuth2Tests::test_account_tokens FAILED allauth/socialaccount/providers/dropbox/tests.py::DropboxOAuth2Tests::test_authentication_error FAILED allauth/socialaccount/providers/dropbox/tests.py::DropboxOAuth2Tests::test_login FAILED allauth/socialaccount/providers/dropbox/tests.py::DropboxOAuth2Tests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/dropbox/tests.py::DropboxOAuth2Tests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/dummy/tests.py::test_login - Attribute... FAILED allauth/socialaccount/providers/dwolla/tests.py::DwollaTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/dwolla/tests.py::DwollaTests::test_account_tokens FAILED allauth/socialaccount/providers/dwolla/tests.py::DwollaTests::test_authentication_error FAILED allauth/socialaccount/providers/dwolla/tests.py::DwollaTests::test_login FAILED allauth/socialaccount/providers/dwolla/tests.py::DwollaTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/dwolla/tests.py::DwollaTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/edmodo/tests.py::EdmodoTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/edmodo/tests.py::EdmodoTests::test_account_tokens FAILED allauth/socialaccount/providers/edmodo/tests.py::EdmodoTests::test_authentication_error FAILED allauth/socialaccount/providers/edmodo/tests.py::EdmodoTests::test_login FAILED allauth/socialaccount/providers/edmodo/tests.py::EdmodoTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/edmodo/tests.py::EdmodoTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/edx/tests.py::EdxTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/edx/tests.py::EdxTests::test_account_tokens FAILED allauth/socialaccount/providers/edx/tests.py::EdxTests::test_authentication_error FAILED allauth/socialaccount/providers/edx/tests.py::EdxTests::test_login - A... FAILED allauth/socialaccount/providers/edx/tests.py::EdxTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/edx/tests.py::EdxTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/eventbrite/tests.py::EventbriteTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/eventbrite/tests.py::EventbriteTests::test_account_tokens FAILED allauth/socialaccount/providers/eventbrite/tests.py::EventbriteTests::test_authentication_error FAILED allauth/socialaccount/providers/eventbrite/tests.py::EventbriteTests::test_login FAILED allauth/socialaccount/providers/eventbrite/tests.py::EventbriteTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/eventbrite/tests.py::EventbriteTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/eveonline/tests.py::EveOnlineTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/eveonline/tests.py::EveOnlineTests::test_account_tokens FAILED allauth/socialaccount/providers/eveonline/tests.py::EveOnlineTests::test_authentication_error FAILED allauth/socialaccount/providers/eveonline/tests.py::EveOnlineTests::test_login FAILED allauth/socialaccount/providers/eveonline/tests.py::EveOnlineTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/eveonline/tests.py::EveOnlineTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/evernote/tests.py::EvernoteTests::test_authentication_error FAILED allauth/socialaccount/providers/evernote/tests.py::EvernoteTests::test_login FAILED allauth/socialaccount/providers/exist/tests.py::ExistTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/exist/tests.py::ExistTests::test_account_tokens FAILED allauth/socialaccount/providers/exist/tests.py::ExistTests::test_authentication_error FAILED allauth/socialaccount/providers/exist/tests.py::ExistTests::test_login FAILED allauth/socialaccount/providers/exist/tests.py::ExistTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/exist/tests.py::ExistTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_account_tokens FAILED allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_authentication_error FAILED allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_login FAILED allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_login_by_token FAILED allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_login_by_token_reauthenticate FAILED allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_login_unverified FAILED allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_login_verified FAILED allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_media_js FAILED allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_username_based_on_provider FAILED allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_username_based_on_provider_with_simple_name FAILED allauth/socialaccount/providers/facebook/tests.py::FacebookTests::test_username_conflict FAILED allauth/socialaccount/providers/feedly/tests.py::FeedlyTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/feedly/tests.py::FeedlyTests::test_account_tokens FAILED allauth/socialaccount/providers/feedly/tests.py::FeedlyTests::test_authentication_error FAILED allauth/socialaccount/providers/feedly/tests.py::FeedlyTests::test_login FAILED allauth/socialaccount/providers/feedly/tests.py::FeedlyTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/feedly/tests.py::FeedlyTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/feishu/tests.py::FeishuTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/feishu/tests.py::FeishuTests::test_account_tokens FAILED allauth/socialaccount/providers/feishu/tests.py::FeishuTests::test_authentication_error FAILED allauth/socialaccount/providers/feishu/tests.py::FeishuTests::test_login FAILED allauth/socialaccount/providers/feishu/tests.py::FeishuTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/feishu/tests.py::FeishuTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/figma/tests.py::FigmaTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/figma/tests.py::FigmaTests::test_account_tokens FAILED allauth/socialaccount/providers/figma/tests.py::FigmaTests::test_authentication_error FAILED allauth/socialaccount/providers/figma/tests.py::FigmaTests::test_login FAILED allauth/socialaccount/providers/figma/tests.py::FigmaTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/figma/tests.py::FigmaTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/fivehundredpx/tests.py::FiveHundredPxTests::test_authentication_error FAILED allauth/socialaccount/providers/fivehundredpx/tests.py::FiveHundredPxTests::test_auto_signup FAILED allauth/socialaccount/providers/fivehundredpx/tests.py::FiveHundredPxTests::test_login FAILED allauth/socialaccount/providers/flickr/tests.py::FlickrTests::test_authentication_error FAILED allauth/socialaccount/providers/flickr/tests.py::FlickrTests::test_auto_signup FAILED allauth/socialaccount/providers/flickr/tests.py::FlickrTests::test_login FAILED allauth/socialaccount/providers/flickr/tests.py::FlickrWithoutRealNameTests::test_authentication_error FAILED allauth/socialaccount/providers/flickr/tests.py::FlickrWithoutRealNameTests::test_auto_signup FAILED allauth/socialaccount/providers/flickr/tests.py::FlickrWithoutRealNameTests::test_login FAILED allauth/socialaccount/providers/foursquare/tests.py::FoursquareTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/foursquare/tests.py::FoursquareTests::test_account_tokens FAILED allauth/socialaccount/providers/foursquare/tests.py::FoursquareTests::test_authentication_error FAILED allauth/socialaccount/providers/foursquare/tests.py::FoursquareTests::test_login FAILED allauth/socialaccount/providers/foursquare/tests.py::FoursquareTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/foursquare/tests.py::FoursquareTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/frontier/tests.py::FrontierTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/frontier/tests.py::FrontierTests::test_account_tokens FAILED allauth/socialaccount/providers/frontier/tests.py::FrontierTests::test_authentication_error FAILED allauth/socialaccount/providers/frontier/tests.py::FrontierTests::test_login FAILED allauth/socialaccount/providers/frontier/tests.py::FrontierTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/frontier/tests.py::FrontierTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/fxa/tests.py::FirefoxAccountsTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/fxa/tests.py::FirefoxAccountsTests::test_account_tokens FAILED allauth/socialaccount/providers/fxa/tests.py::FirefoxAccountsTests::test_authentication_error FAILED allauth/socialaccount/providers/fxa/tests.py::FirefoxAccountsTests::test_login FAILED allauth/socialaccount/providers/fxa/tests.py::FirefoxAccountsTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/fxa/tests.py::FirefoxAccountsTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_account_name_null FAILED allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_account_tokens FAILED allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_authentication_error FAILED allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_login FAILED allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/gitea/tests.py::GiteaTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/github/tests.py::GitHubTests::test_account_name_null FAILED allauth/socialaccount/providers/github/tests.py::GitHubTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/github/tests.py::GitHubTests::test_account_tokens FAILED allauth/socialaccount/providers/github/tests.py::GitHubTests::test_authentication_error FAILED allauth/socialaccount/providers/github/tests.py::GitHubTests::test_login FAILED allauth/socialaccount/providers/github/tests.py::GitHubTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/github/tests.py::GitHubTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_account_tokens FAILED allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_authentication_error FAILED allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_extra_data FAILED allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_login FAILED allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/gitlab/tests.py::GitLabTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/globus/tests.py::GlobusTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/globus/tests.py::GlobusTests::test_account_tokens FAILED allauth/socialaccount/providers/globus/tests.py::GlobusTests::test_authentication_error FAILED allauth/socialaccount/providers/globus/tests.py::GlobusTests::test_login FAILED allauth/socialaccount/providers/globus/tests.py::GlobusTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/globus/tests.py::GlobusTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/google/tests.py::GoogleTests::test_account_connect FAILED allauth/socialaccount/providers/google/tests.py::GoogleTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/google/tests.py::GoogleTests::test_account_tokens FAILED allauth/socialaccount/providers/google/tests.py::GoogleTests::test_authentication_error FAILED allauth/socialaccount/providers/google/tests.py::GoogleTests::test_email_unverified FAILED allauth/socialaccount/providers/google/tests.py::GoogleTests::test_email_verified FAILED allauth/socialaccount/providers/google/tests.py::GoogleTests::test_email_verified_stashed FAILED allauth/socialaccount/providers/google/tests.py::GoogleTests::test_login FAILED allauth/socialaccount/providers/google/tests.py::GoogleTests::test_social_email_verification_optional FAILED allauth/socialaccount/providers/google/tests.py::GoogleTests::test_social_email_verification_skipped FAILED allauth/socialaccount/providers/google/tests.py::GoogleTests::test_user_signed_up_signal FAILED allauth/socialaccount/providers/google/tests.py::GoogleTests::test_username_based_on_email FAILED allauth/socialaccount/providers/google/tests.py::GoogleTests::test_wrong_id_token_claim_values FAILED allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_account_connect FAILED allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_account_tokens FAILED allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_authentication_error FAILED allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_email_unverified FAILED allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_email_verified FAILED allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_email_verified_stashed FAILED allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_login FAILED allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_social_email_verification_optional FAILED allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_social_email_verification_skipped FAILED allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_user_signed_up_signal FAILED allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_username_based_on_email FAILED allauth/socialaccount/providers/google/tests.py::AppInSettingsTests::test_wrong_id_token_claim_values FAILED allauth/socialaccount/providers/google/tests.py::test_login_by_token FAILED allauth/socialaccount/providers/gumroad/tests.py::GumroadTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/gumroad/tests.py::GumroadTests::test_account_tokens FAILED allauth/socialaccount/providers/gumroad/tests.py::GumroadTests::test_authentication_error FAILED allauth/socialaccount/providers/gumroad/tests.py::GumroadTests::test_login FAILED allauth/socialaccount/providers/gumroad/tests.py::GumroadTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/gumroad/tests.py::GumroadTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/hubic/tests.py::HubicTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/hubic/tests.py::HubicTests::test_account_tokens FAILED allauth/socialaccount/providers/hubic/tests.py::HubicTests::test_authentication_error FAILED allauth/socialaccount/providers/hubic/tests.py::HubicTests::test_login FAILED allauth/socialaccount/providers/hubic/tests.py::HubicTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/hubic/tests.py::HubicTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/hubspot/tests.py::HubspotTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/hubspot/tests.py::HubspotTests::test_account_tokens FAILED allauth/socialaccount/providers/hubspot/tests.py::HubspotTests::test_authentication_error FAILED allauth/socialaccount/providers/hubspot/tests.py::HubspotTests::test_login FAILED allauth/socialaccount/providers/hubspot/tests.py::HubspotTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/hubspot/tests.py::HubspotTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/instagram/tests.py::InstagramTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/instagram/tests.py::InstagramTests::test_account_tokens FAILED allauth/socialaccount/providers/instagram/tests.py::InstagramTests::test_authentication_error FAILED allauth/socialaccount/providers/instagram/tests.py::InstagramTests::test_login FAILED allauth/socialaccount/providers/instagram/tests.py::InstagramTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/instagram/tests.py::InstagramTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/jupyterhub/tests.py::JupyterHubTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/jupyterhub/tests.py::JupyterHubTests::test_account_tokens FAILED allauth/socialaccount/providers/jupyterhub/tests.py::JupyterHubTests::test_authentication_error FAILED allauth/socialaccount/providers/jupyterhub/tests.py::JupyterHubTests::test_login FAILED allauth/socialaccount/providers/jupyterhub/tests.py::JupyterHubTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/jupyterhub/tests.py::JupyterHubTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/kakao/tests.py::KakaoTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/kakao/tests.py::KakaoTests::test_account_tokens FAILED allauth/socialaccount/providers/kakao/tests.py::KakaoTests::test_authentication_error FAILED allauth/socialaccount/providers/kakao/tests.py::KakaoTests::test_login FAILED allauth/socialaccount/providers/kakao/tests.py::KakaoTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/kakao/tests.py::KakaoTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/lemonldap/tests.py::LemonLDAPTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/lemonldap/tests.py::LemonLDAPTests::test_account_tokens FAILED allauth/socialaccount/providers/lemonldap/tests.py::LemonLDAPTests::test_authentication_error FAILED allauth/socialaccount/providers/lemonldap/tests.py::LemonLDAPTests::test_login FAILED allauth/socialaccount/providers/lemonldap/tests.py::LemonLDAPTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/lemonldap/tests.py::LemonLDAPTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/lichess/tests.py::LichessTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/lichess/tests.py::LichessTests::test_account_tokens FAILED allauth/socialaccount/providers/lichess/tests.py::LichessTests::test_authentication_error FAILED allauth/socialaccount/providers/lichess/tests.py::LichessTests::test_login FAILED allauth/socialaccount/providers/lichess/tests.py::LichessTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/lichess/tests.py::LichessTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/line/tests.py::LineTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/line/tests.py::LineTests::test_account_tokens FAILED allauth/socialaccount/providers/line/tests.py::LineTests::test_authentication_error FAILED allauth/socialaccount/providers/line/tests.py::LineTests::test_login FAILED allauth/socialaccount/providers/line/tests.py::LineTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/line/tests.py::LineTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_account_tokens FAILED allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_authentication_error FAILED allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_login FAILED allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/linkedin_oauth2/tests.py::LinkedInOAuth2Tests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/mailchimp/tests.py::MailChimpTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/mailchimp/tests.py::MailChimpTests::test_account_tokens FAILED allauth/socialaccount/providers/mailchimp/tests.py::MailChimpTests::test_authentication_error FAILED allauth/socialaccount/providers/mailchimp/tests.py::MailChimpTests::test_login FAILED allauth/socialaccount/providers/mailchimp/tests.py::MailChimpTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/mailchimp/tests.py::MailChimpTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/mailru/tests.py::MailRuTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/mailru/tests.py::MailRuTests::test_account_tokens FAILED allauth/socialaccount/providers/mailru/tests.py::MailRuTests::test_authentication_error FAILED allauth/socialaccount/providers/mailru/tests.py::MailRuTests::test_login FAILED allauth/socialaccount/providers/mailru/tests.py::MailRuTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/mailru/tests.py::MailRuTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/mediawiki/tests.py::MediaWikiTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/mediawiki/tests.py::MediaWikiTests::test_account_tokens FAILED allauth/socialaccount/providers/mediawiki/tests.py::MediaWikiTests::test_authentication_error FAILED allauth/socialaccount/providers/mediawiki/tests.py::MediaWikiTests::test_login FAILED allauth/socialaccount/providers/mediawiki/tests.py::MediaWikiTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/mediawiki/tests.py::MediaWikiTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/meetup/tests.py::MeetupTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/meetup/tests.py::MeetupTests::test_account_tokens FAILED allauth/socialaccount/providers/meetup/tests.py::MeetupTests::test_authentication_error FAILED allauth/socialaccount/providers/meetup/tests.py::MeetupTests::test_login FAILED allauth/socialaccount/providers/meetup/tests.py::MeetupTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/meetup/tests.py::MeetupTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_account_tokens FAILED allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_authentication_error FAILED allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_login FAILED allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/microsoft/tests.py::MicrosoftGraphTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/miro/tests.py::MiroTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/miro/tests.py::MiroTests::test_account_tokens FAILED allauth/socialaccount/providers/miro/tests.py::MiroTests::test_authentication_error FAILED allauth/socialaccount/providers/miro/tests.py::MiroTests::test_login FAILED allauth/socialaccount/providers/miro/tests.py::MiroTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/miro/tests.py::MiroTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/naver/tests.py::NaverTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/naver/tests.py::NaverTests::test_account_tokens FAILED allauth/socialaccount/providers/naver/tests.py::NaverTests::test_authentication_error FAILED allauth/socialaccount/providers/naver/tests.py::NaverTests::test_login FAILED allauth/socialaccount/providers/naver/tests.py::NaverTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/naver/tests.py::NaverTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/netiq/tests.py::NetIQTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/netiq/tests.py::NetIQTests::test_account_tokens FAILED allauth/socialaccount/providers/netiq/tests.py::NetIQTests::test_authentication_error FAILED allauth/socialaccount/providers/netiq/tests.py::NetIQTests::test_login FAILED allauth/socialaccount/providers/netiq/tests.py::NetIQTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/netiq/tests.py::NetIQTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/nextcloud/tests.py::NextCloudTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/nextcloud/tests.py::NextCloudTests::test_account_tokens FAILED allauth/socialaccount/providers/nextcloud/tests.py::NextCloudTests::test_authentication_error FAILED allauth/socialaccount/providers/nextcloud/tests.py::NextCloudTests::test_login FAILED allauth/socialaccount/providers/nextcloud/tests.py::NextCloudTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/nextcloud/tests.py::NextCloudTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/notion/tests.py::NotionTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/notion/tests.py::NotionTests::test_account_tokens FAILED allauth/socialaccount/providers/notion/tests.py::NotionTests::test_authentication_error FAILED allauth/socialaccount/providers/notion/tests.py::NotionTests::test_login FAILED allauth/socialaccount/providers/notion/tests.py::NotionTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/notion/tests.py::NotionTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/oauth2/tests/test_views.py::test_samesite_strict[True-False-True] FAILED allauth/socialaccount/providers/oauth2/tests/test_views.py::test_samesite_strict[True-True-False] FAILED allauth/socialaccount/providers/oauth2/tests/test_views.py::test_samesite_strict[False-False-False] FAILED allauth/socialaccount/providers/odnoklassniki/tests.py::OdnoklassnikiTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/odnoklassniki/tests.py::OdnoklassnikiTests::test_account_tokens FAILED allauth/socialaccount/providers/odnoklassniki/tests.py::OdnoklassnikiTests::test_authentication_error FAILED allauth/socialaccount/providers/odnoklassniki/tests.py::OdnoklassnikiTests::test_login FAILED allauth/socialaccount/providers/odnoklassniki/tests.py::OdnoklassnikiTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/odnoklassniki/tests.py::OdnoklassnikiTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/okta/tests.py::OktaTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/okta/tests.py::OktaTests::test_account_tokens FAILED allauth/socialaccount/providers/okta/tests.py::OktaTests::test_authentication_error FAILED allauth/socialaccount/providers/okta/tests.py::OktaTests::test_login FAILED allauth/socialaccount/providers/okta/tests.py::OktaTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/okta/tests.py::OktaTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/openid/tests.py::OpenIDTests::test_discovery_failure FAILED allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_account_tokens FAILED allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_authentication_error FAILED allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_login FAILED allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_login_auto_signup FAILED allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/openid_connect/tests.py::MainOpenIDConnectTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_account_tokens FAILED allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_authentication_error FAILED allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_login FAILED allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_login_auto_signup FAILED allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/openid_connect/tests.py::OtherOpenIDConnectTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/openstreetmap/tests.py::OpenStreetMapTests::test_authentication_error FAILED allauth/socialaccount/providers/openstreetmap/tests.py::OpenStreetMapTests::test_auto_signup FAILED allauth/socialaccount/providers/openstreetmap/tests.py::OpenStreetMapTests::test_login FAILED allauth/socialaccount/providers/orcid/tests.py::OrcidTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/orcid/tests.py::OrcidTests::test_account_tokens FAILED allauth/socialaccount/providers/orcid/tests.py::OrcidTests::test_authentication_error FAILED allauth/socialaccount/providers/orcid/tests.py::OrcidTests::test_login FAILED allauth/socialaccount/providers/orcid/tests.py::OrcidTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/orcid/tests.py::OrcidTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/patreon/tests.py::PatreonTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/patreon/tests.py::PatreonTests::test_account_tokens FAILED allauth/socialaccount/providers/patreon/tests.py::PatreonTests::test_authentication_error FAILED allauth/socialaccount/providers/patreon/tests.py::PatreonTests::test_login FAILED allauth/socialaccount/providers/patreon/tests.py::PatreonTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/patreon/tests.py::PatreonTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/paypal/tests.py::PaypalTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/paypal/tests.py::PaypalTests::test_account_tokens FAILED allauth/socialaccount/providers/paypal/tests.py::PaypalTests::test_authentication_error FAILED allauth/socialaccount/providers/paypal/tests.py::PaypalTests::test_login FAILED allauth/socialaccount/providers/paypal/tests.py::PaypalTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/paypal/tests.py::PaypalTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_account_tokens FAILED allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_authentication_error FAILED allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_login FAILED allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_login_v5 FAILED allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/pinterest/tests.py::PinterestTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/pocket/tests.py::PocketOAuthTests::test_authentication_error FAILED allauth/socialaccount/providers/pocket/tests.py::PocketOAuthTests::test_login FAILED allauth/socialaccount/providers/questrade/tests.py::QuestradeTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/questrade/tests.py::QuestradeTests::test_account_tokens FAILED allauth/socialaccount/providers/questrade/tests.py::QuestradeTests::test_authentication_error FAILED allauth/socialaccount/providers/questrade/tests.py::QuestradeTests::test_login FAILED allauth/socialaccount/providers/questrade/tests.py::QuestradeTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/questrade/tests.py::QuestradeTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/quickbooks/tests.py::QuickBooksOAuth2Tests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/quickbooks/tests.py::QuickBooksOAuth2Tests::test_account_tokens FAILED allauth/socialaccount/providers/quickbooks/tests.py::QuickBooksOAuth2Tests::test_authentication_error FAILED allauth/socialaccount/providers/quickbooks/tests.py::QuickBooksOAuth2Tests::test_login FAILED allauth/socialaccount/providers/quickbooks/tests.py::QuickBooksOAuth2Tests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/quickbooks/tests.py::QuickBooksOAuth2Tests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/reddit/tests.py::RedditTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/reddit/tests.py::RedditTests::test_account_tokens FAILED allauth/socialaccount/providers/reddit/tests.py::RedditTests::test_authentication_error FAILED allauth/socialaccount/providers/reddit/tests.py::RedditTests::test_login FAILED allauth/socialaccount/providers/reddit/tests.py::RedditTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/reddit/tests.py::RedditTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/robinhood/tests.py::RobinhoodTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/robinhood/tests.py::RobinhoodTests::test_account_tokens FAILED allauth/socialaccount/providers/robinhood/tests.py::RobinhoodTests::test_authentication_error FAILED allauth/socialaccount/providers/robinhood/tests.py::RobinhoodTests::test_login FAILED allauth/socialaccount/providers/robinhood/tests.py::RobinhoodTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/robinhood/tests.py::RobinhoodTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/salesforce/tests.py::SalesforceTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/salesforce/tests.py::SalesforceTests::test_account_tokens FAILED allauth/socialaccount/providers/salesforce/tests.py::SalesforceTests::test_authentication_error FAILED allauth/socialaccount/providers/salesforce/tests.py::SalesforceTests::test_login FAILED allauth/socialaccount/providers/salesforce/tests.py::SalesforceTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/salesforce/tests.py::SalesforceTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/saml/tests.py::test_acs[False-adv_settings0-state_kwargs0-/not/here-/accounts/profile/] FAILED allauth/socialaccount/providers/saml/tests.py::test_acs[False-adv_settings1-state_kwargs1-/not/here-/here] FAILED allauth/socialaccount/providers/saml/tests.py::test_acs[False-adv_settings2-state_kwargs2-/not/here-expected_url2] FAILED allauth/socialaccount/providers/saml/tests.py::test_acs[False-adv_settings3-state_kwargs3-/not/here-/here] FAILED allauth/socialaccount/providers/saml/tests.py::test_acs[True-adv_settings4-state_kwargs4-/set-by-idp-/set-by-idp] FAILED allauth/socialaccount/providers/saml/tests.py::test_acs[True-adv_settings5-state_kwargs5-not-a-url-/accounts/profile/] FAILED allauth/socialaccount/providers/saml/tests.py::test_acs[True-adv_settings6-state_kwargs6-/set-by-idp-/set-by-idp] FAILED allauth/socialaccount/providers/saml/tests.py::test_acs_error - Attrib... FAILED allauth/socialaccount/providers/saml/tests.py::test_acs_get - Attribut... FAILED allauth/socialaccount/providers/saml/tests.py::test_sls_get - Attribut... FAILED allauth/socialaccount/providers/saml/tests.py::test_login_on_get - Att... FAILED allauth/socialaccount/providers/saml/tests.py::test_login - AttributeE... FAILED allauth/socialaccount/providers/saml/tests.py::test_metadata - Attribu... FAILED allauth/socialaccount/providers/saml/tests.py::test_sls - AttributeErr... FAILED allauth/socialaccount/providers/sharefile/tests.py::ShareFileTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/sharefile/tests.py::ShareFileTests::test_account_tokens FAILED allauth/socialaccount/providers/sharefile/tests.py::ShareFileTests::test_authentication_error FAILED allauth/socialaccount/providers/sharefile/tests.py::ShareFileTests::test_login FAILED allauth/socialaccount/providers/sharefile/tests.py::ShareFileTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/sharefile/tests.py::ShareFileTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyTests::test_account_tokens FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyTests::test_authentication_error FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyTests::test_login FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyEmbeddedTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyEmbeddedTests::test_account_tokens FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyEmbeddedTests::test_authentication_error FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyEmbeddedTests::test_login FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyEmbeddedTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyEmbeddedTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_account_tokens FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_associated_user FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_authentication_error FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_login FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/shopify/tests.py::ShopifyPerUserAccessTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/slack/tests.py::SlackOAuth2Tests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/slack/tests.py::SlackOAuth2Tests::test_account_tokens FAILED allauth/socialaccount/providers/slack/tests.py::SlackOAuth2Tests::test_authentication_error FAILED allauth/socialaccount/providers/slack/tests.py::SlackOAuth2Tests::test_login FAILED allauth/socialaccount/providers/slack/tests.py::SlackOAuth2Tests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/slack/tests.py::SlackOAuth2Tests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/snapchat/tests.py::SnapchatOAuth2Tests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/snapchat/tests.py::SnapchatOAuth2Tests::test_account_tokens FAILED allauth/socialaccount/providers/snapchat/tests.py::SnapchatOAuth2Tests::test_authentication_error FAILED allauth/socialaccount/providers/snapchat/tests.py::SnapchatOAuth2Tests::test_login FAILED allauth/socialaccount/providers/snapchat/tests.py::SnapchatOAuth2Tests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/snapchat/tests.py::SnapchatOAuth2Tests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/soundcloud/tests.py::SoundCloudTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/soundcloud/tests.py::SoundCloudTests::test_account_tokens FAILED allauth/socialaccount/providers/soundcloud/tests.py::SoundCloudTests::test_authentication_error FAILED allauth/socialaccount/providers/soundcloud/tests.py::SoundCloudTests::test_login FAILED allauth/socialaccount/providers/soundcloud/tests.py::SoundCloudTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/soundcloud/tests.py::SoundCloudTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/spotify/tests.py::SpotifyOAuth2Tests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/spotify/tests.py::SpotifyOAuth2Tests::test_account_tokens FAILED allauth/socialaccount/providers/spotify/tests.py::SpotifyOAuth2Tests::test_authentication_error FAILED allauth/socialaccount/providers/spotify/tests.py::SpotifyOAuth2Tests::test_login FAILED allauth/socialaccount/providers/spotify/tests.py::SpotifyOAuth2Tests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/spotify/tests.py::SpotifyOAuth2Tests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/stackexchange/tests.py::StackExchangeTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/stackexchange/tests.py::StackExchangeTests::test_account_tokens FAILED allauth/socialaccount/providers/stackexchange/tests.py::StackExchangeTests::test_authentication_error FAILED allauth/socialaccount/providers/stackexchange/tests.py::StackExchangeTests::test_login FAILED allauth/socialaccount/providers/stackexchange/tests.py::StackExchangeTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/stackexchange/tests.py::StackExchangeTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/stocktwits/tests.py::StocktwitsTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/stocktwits/tests.py::StocktwitsTests::test_account_tokens FAILED allauth/socialaccount/providers/stocktwits/tests.py::StocktwitsTests::test_authentication_error FAILED allauth/socialaccount/providers/stocktwits/tests.py::StocktwitsTests::test_login FAILED allauth/socialaccount/providers/stocktwits/tests.py::StocktwitsTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/stocktwits/tests.py::StocktwitsTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/strava/tests.py::StravaTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/strava/tests.py::StravaTests::test_account_tokens FAILED allauth/socialaccount/providers/strava/tests.py::StravaTests::test_authentication_error FAILED allauth/socialaccount/providers/strava/tests.py::StravaTests::test_login FAILED allauth/socialaccount/providers/strava/tests.py::StravaTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/strava/tests.py::StravaTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/strava/tests.py::StravaTests::test_valid_avatar FAILED allauth/socialaccount/providers/stripe/tests.py::StripeTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/stripe/tests.py::StripeTests::test_account_tokens FAILED allauth/socialaccount/providers/stripe/tests.py::StripeTests::test_authentication_error FAILED allauth/socialaccount/providers/stripe/tests.py::StripeTests::test_login FAILED allauth/socialaccount/providers/stripe/tests.py::StripeTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/stripe/tests.py::StripeTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/telegram/tests.py::test_login - Attrib... FAILED allauth/socialaccount/providers/telegram/tests.py::test_callback_get FAILED allauth/socialaccount/providers/telegram/tests.py::test_callback - Att... FAILED allauth/socialaccount/providers/tiktok/tests.py::TikTokTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/tiktok/tests.py::TikTokTests::test_account_tokens FAILED allauth/socialaccount/providers/tiktok/tests.py::TikTokTests::test_authentication_error FAILED allauth/socialaccount/providers/tiktok/tests.py::TikTokTests::test_login FAILED allauth/socialaccount/providers/tiktok/tests.py::TikTokTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/tiktok/tests.py::TikTokTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_account_tokens FAILED allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_authentication_error FAILED allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_login FAILED allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/trainingpeaks/tests.py::TrainingPeaksTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/trello/tests.py::TrelloTests::test_authentication_error FAILED allauth/socialaccount/providers/trello/tests.py::TrelloTests::test_auto_signup FAILED allauth/socialaccount/providers/trello/tests.py::TrelloTests::test_login FAILED allauth/socialaccount/providers/tumblr/tests.py::TumblrTests::test_authentication_error FAILED allauth/socialaccount/providers/tumblr/tests.py::TumblrTests::test_auto_signup FAILED allauth/socialaccount/providers/tumblr/tests.py::TumblrTests::test_login FAILED allauth/socialaccount/providers/twentythreeandme/tests.py::TwentyThreeAndMeTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/twentythreeandme/tests.py::TwentyThreeAndMeTests::test_account_tokens FAILED allauth/socialaccount/providers/twentythreeandme/tests.py::TwentyThreeAndMeTests::test_authentication_error FAILED allauth/socialaccount/providers/twentythreeandme/tests.py::TwentyThreeAndMeTests::test_login FAILED allauth/socialaccount/providers/twentythreeandme/tests.py::TwentyThreeAndMeTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/twentythreeandme/tests.py::TwentyThreeAndMeTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_account_tokens FAILED allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_authentication_error FAILED allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_empty_or_missing_data_key_raises_OAuth2Error FAILED allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_login FAILED allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_missing_twitch_id_raises_OAuth2Error FAILED allauth/socialaccount/providers/twitch/tests.py::TwitchTests::test_response_over_400_raises_OAuth2Error FAILED allauth/socialaccount/providers/twitter/tests.py::TwitterTests::test_authentication_error FAILED allauth/socialaccount/providers/twitter/tests.py::TwitterTests::test_auto_signup FAILED allauth/socialaccount/providers/twitter/tests.py::TwitterTests::test_login FAILED allauth/socialaccount/providers/twitter_oauth2/tests.py::TwitterOAuth2Tests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/twitter_oauth2/tests.py::TwitterOAuth2Tests::test_account_tokens FAILED allauth/socialaccount/providers/twitter_oauth2/tests.py::TwitterOAuth2Tests::test_authentication_error FAILED allauth/socialaccount/providers/twitter_oauth2/tests.py::TwitterOAuth2Tests::test_login FAILED allauth/socialaccount/providers/twitter_oauth2/tests.py::TwitterOAuth2Tests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/twitter_oauth2/tests.py::TwitterOAuth2Tests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/untappd/tests.py::UntappdTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/untappd/tests.py::UntappdTests::test_account_tokens FAILED allauth/socialaccount/providers/untappd/tests.py::UntappdTests::test_authentication_error FAILED allauth/socialaccount/providers/untappd/tests.py::UntappdTests::test_login FAILED allauth/socialaccount/providers/untappd/tests.py::UntappdTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/untappd/tests.py::UntappdTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/vimeo/tests.py::VimeoTests::test_authentication_error FAILED allauth/socialaccount/providers/vimeo/tests.py::VimeoTests::test_auto_signup FAILED allauth/socialaccount/providers/vimeo/tests.py::VimeoTests::test_login FAILED allauth/socialaccount/providers/vimeo_oauth2/tests.py::VimeoOAuth2Tests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/vimeo_oauth2/tests.py::VimeoOAuth2Tests::test_account_tokens FAILED allauth/socialaccount/providers/vimeo_oauth2/tests.py::VimeoOAuth2Tests::test_authentication_error FAILED allauth/socialaccount/providers/vimeo_oauth2/tests.py::VimeoOAuth2Tests::test_login FAILED allauth/socialaccount/providers/vimeo_oauth2/tests.py::VimeoOAuth2Tests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/vimeo_oauth2/tests.py::VimeoOAuth2Tests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/vk/tests.py::VKTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/vk/tests.py::VKTests::test_account_tokens FAILED allauth/socialaccount/providers/vk/tests.py::VKTests::test_authentication_error FAILED allauth/socialaccount/providers/vk/tests.py::VKTests::test_login - Att... FAILED allauth/socialaccount/providers/vk/tests.py::VKTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/vk/tests.py::VKTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/wahoo/tests.py::WahooTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/wahoo/tests.py::WahooTests::test_account_tokens FAILED allauth/socialaccount/providers/wahoo/tests.py::WahooTests::test_authentication_error FAILED allauth/socialaccount/providers/wahoo/tests.py::WahooTests::test_login FAILED allauth/socialaccount/providers/wahoo/tests.py::WahooTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/wahoo/tests.py::WahooTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/weibo/tests.py::WeiboTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/weibo/tests.py::WeiboTests::test_account_tokens FAILED allauth/socialaccount/providers/weibo/tests.py::WeiboTests::test_authentication_error FAILED allauth/socialaccount/providers/weibo/tests.py::WeiboTests::test_login FAILED allauth/socialaccount/providers/weibo/tests.py::WeiboTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/weibo/tests.py::WeiboTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/weixin/tests.py::WeixinTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/weixin/tests.py::WeixinTests::test_account_tokens FAILED allauth/socialaccount/providers/weixin/tests.py::WeixinTests::test_authentication_error FAILED allauth/socialaccount/providers/weixin/tests.py::WeixinTests::test_login FAILED allauth/socialaccount/providers/weixin/tests.py::WeixinTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/weixin/tests.py::WeixinTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/windowslive/tests.py::WindowsLiveTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/windowslive/tests.py::WindowsLiveTests::test_account_tokens FAILED allauth/socialaccount/providers/windowslive/tests.py::WindowsLiveTests::test_authentication_error FAILED allauth/socialaccount/providers/windowslive/tests.py::WindowsLiveTests::test_login FAILED allauth/socialaccount/providers/windowslive/tests.py::WindowsLiveTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/windowslive/tests.py::WindowsLiveTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/xing/tests.py::XingTests::test_authentication_error FAILED allauth/socialaccount/providers/xing/tests.py::XingTests::test_auto_signup FAILED allauth/socialaccount/providers/xing/tests.py::XingTests::test_login FAILED allauth/socialaccount/providers/yahoo/tests.py::YahooTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/yahoo/tests.py::YahooTests::test_account_tokens FAILED allauth/socialaccount/providers/yahoo/tests.py::YahooTests::test_authentication_error FAILED allauth/socialaccount/providers/yahoo/tests.py::YahooTests::test_login FAILED allauth/socialaccount/providers/yahoo/tests.py::YahooTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/yahoo/tests.py::YahooTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/yandex/tests.py::YandexTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/yandex/tests.py::YandexTests::test_account_tokens FAILED allauth/socialaccount/providers/yandex/tests.py::YandexTests::test_authentication_error FAILED allauth/socialaccount/providers/yandex/tests.py::YandexTests::test_login FAILED allauth/socialaccount/providers/yandex/tests.py::YandexTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/yandex/tests.py::YandexTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_account_tokens FAILED allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_authentication_error FAILED allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_login FAILED allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/ynab/tests.py::YNABTests::test_ynab_compelete_login_401 FAILED allauth/socialaccount/providers/zoho/tests.py::ZohoTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/zoho/tests.py::ZohoTests::test_account_tokens FAILED allauth/socialaccount/providers/zoho/tests.py::ZohoTests::test_authentication_error FAILED allauth/socialaccount/providers/zoho/tests.py::ZohoTests::test_login FAILED allauth/socialaccount/providers/zoho/tests.py::ZohoTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/zoho/tests.py::ZohoTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/providers/zoom/tests.py::ZoomTests::test_account_refresh_token_saved_next_login FAILED allauth/socialaccount/providers/zoom/tests.py::ZoomTests::test_account_tokens FAILED allauth/socialaccount/providers/zoom/tests.py::ZoomTests::test_authentication_error FAILED allauth/socialaccount/providers/zoom/tests.py::ZoomTests::test_login FAILED allauth/socialaccount/providers/zoom/tests.py::ZoomTests::test_login_with_pkce_disabled FAILED allauth/socialaccount/providers/zoom/tests.py::ZoomTests::test_login_with_pkce_enabled FAILED allauth/socialaccount/tests/test_adapter.py::test_generate_state_param FAILED allauth/socialaccount/tests/test_connect.py::test_disconnect[False] - ... FAILED allauth/socialaccount/tests/test_connect.py::test_disconnect[True] - A... FAILED allauth/socialaccount/tests/test_connect.py::test_connect_with_reauthentication FAILED allauth/socialaccount/tests/test_connect.py::test_connect - AttributeE... FAILED allauth/socialaccount/tests/test_connect.py::test_connect_vs_email_authentication[False-False-added] FAILED allauth/socialaccount/tests/test_connect.py::test_connect_vs_email_authentication[False-True-updated] FAILED allauth/socialaccount/tests/test_connect.py::test_connect_vs_email_authentication[True-False-added] FAILED allauth/socialaccount/tests/test_connect.py::test_connect_vs_email_authentication[True-True-updated] FAILED allauth/socialaccount/tests/test_login.py::test_email_authentication[off-False-False] FAILED allauth/socialaccount/tests/test_login.py::test_email_authentication[off-False-True] FAILED allauth/socialaccount/tests/test_login.py::test_email_authentication[off-True-False] FAILED allauth/socialaccount/tests/test_login.py::test_email_authentication[off-True-True] FAILED allauth/socialaccount/tests/test_login.py::test_email_authentication[on-global-False-False] FAILED allauth/socialaccount/tests/test_login.py::test_email_authentication[on-global-False-True] FAILED allauth/socialaccount/tests/test_login.py::test_email_authentication[on-global-True-False] FAILED allauth/socialaccount/tests/test_login.py::test_email_authentication[on-global-True-True] FAILED allauth/socialaccount/tests/test_login.py::test_email_authentication[on-provider-False-False] FAILED allauth/socialaccount/tests/test_login.py::test_email_authentication[on-provider-False-True] FAILED allauth/socialaccount/tests/test_login.py::test_email_authentication[on-provider-True-False] FAILED allauth/socialaccount/tests/test_login.py::test_email_authentication[on-provider-True-True] FAILED allauth/socialaccount/tests/test_login.py::test_record_authentication[login-True-False] FAILED allauth/socialaccount/tests/test_login.py::test_record_authentication[login-True-True] FAILED allauth/socialaccount/tests/test_login.py::test_record_authentication[connect-False-False] FAILED allauth/socialaccount/tests/test_login.py::test_record_authentication[connect-False-True] FAILED allauth/socialaccount/tests/test_signup.py::test_email_address_created FAILED allauth/socialaccount/tests/test_signup.py::test_email_address_clash_username_required FAILED allauth/socialaccount/tests/test_signup.py::test_email_address_clash_username_not_required FAILED allauth/socialaccount/tests/test_signup.py::test_email_address_clash_username_auto_signup FAILED allauth/socialaccount/tests/test_signup.py::test_populate_username_in_blacklist FAILED allauth/socialaccount/tests/test_signup.py::test_verified_email_change_at_signup FAILED allauth/socialaccount/tests/test_signup.py::test_unverified_email_change_at_signup FAILED allauth/socialaccount/tests/test_signup.py::test_unique_email_validation_signup FAILED allauth/socialaccount/tests/test_signup.py::test_social_account_taken_at_signup FAILED allauth/socialaccount/tests/test_signup.py::test_email_address_required_missing_from_sociallogin FAILED allauth/socialaccount/tests/test_signup.py::test_email_address_conflict_at_social_signup_form FAILED allauth/socialaccount/tests/test_signup.py::test_email_address_conflict_during_auto_signup FAILED allauth/socialaccount/tests/test_signup.py::test_email_address_conflict_removes_conflicting_email FAILED allauth/socialaccount/tests/test_signup.py::test_signup_closed - Attri... FAILED allauth/tests.py::BasicTests::test_templatetag_with_csrf_failure - Att... FAILED allauth/usersessions/tests/test_views.py::test_overall_flow - Attribut... FAILED allauth/usersessions/tests/test_views.py::test_change_password_updates_user_session[True] FAILED allauth/usersessions/tests/test_views.py::test_change_password_updates_user_session[False] FAILED allauth/account/tests/test_middleware.py::test_accounts_redirect_async_ctx FAILED allauth/account/tests/test_decorators.py::test_secure_admin_login_skips_admin_login_next FAILED allauth/headless/account/tests/test_login.py::test_auth_password_input_error[app] FAILED allauth/headless/account/tests/test_login.py::test_auth_password_input_error[browser] FAILED allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow_wrong_key[app-get] FAILED allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow_wrong_key[app-post] FAILED allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow_wrong_key[browser-get] FAILED allauth/headless/account/tests/test_reset_password.py::test_password_reset_flow_wrong_key[browser-post] FAILED allauth/mfa/base/tests/test_views.py::test_login_required_views[mfa_activate_totp] FAILED allauth/mfa/base/tests/test_views.py::test_login_required_views[mfa_index] FAILED allauth/mfa/base/tests/test_views.py::test_login_required_views[mfa_deactivate_totp] FAILED allauth/mfa/webauthn/tests/test_views.py::test_get_passkey_login_challenge_redirects_if_not_ajax FAILED allauth/socialaccount/providers/saml/tests.py::test_build_saml_config_without_metadata_url[provider_config0] FAILED allauth/socialaccount/providers/saml/tests.py::test_build_saml_config[provider_config0] FAILED allauth/socialaccount/providers/saml/tests.py::test_build_saml_config[provider_config1] FAILED allauth/socialaccount/tests/test_login.py::test_login_cancelled - Attr... === 1167 failed, 363 passed, 2 deselected, 10 warnings in 100.05s (0:01:40) ==== error: Bad exit status from /var/tmp/rpm-tmp.wXJHDZ (%check) Bad exit status from /var/tmp/rpm-tmp.wXJHDZ (%check) RPM build errors: Finish: rpmbuild python-django-allauth-65.3.0-5.fc43.src.rpm Finish: build phase for python-django-allauth-65.3.0-5.fc43.src.rpm INFO: chroot_scan: 1 files copied to /var/lib/copr-rpmbuild/results/chroot_scan INFO: /var/lib/mock/fedora-43-x86_64-1756503654.411359/root/var/log/dnf5.log INFO: chroot_scan: creating tarball /var/lib/copr-rpmbuild/results/chroot_scan.tar.gz /bin/tar: Removing leading `/' from member names ERROR: Exception(/var/lib/copr-rpmbuild/results/python-django-allauth-65.3.0-5.fc43.src.rpm) Config(fedora-43-x86_64) 2 minutes 5 seconds INFO: Results and/or logs in: /var/lib/copr-rpmbuild/results INFO: Cleaning up build root ('cleanup_on_failure=True') Start: clean chroot INFO: unmounting tmpfs. Finish: clean chroot ERROR: Command failed: # /usr/bin/systemd-nspawn -q -M 210ffcee9332439eaca203dfed7ff67c -D /var/lib/mock/fedora-43-x86_64-1756503654.411359/root -a -u mockbuild --capability=cap_ipc_lock --rlimit=RLIMIT_NOFILE=10240 --capability=cap_ipc_lock --bind=/tmp/mock-resolv.sxa34fk4:/etc/resolv.conf --bind=/dev/btrfs-control --bind=/dev/mapper/control --bind=/dev/fuse --bind=/dev/loop-control --bind=/dev/loop0 --bind=/dev/loop1 --bind=/dev/loop2 --bind=/dev/loop3 --bind=/dev/loop4 --bind=/dev/loop5 --bind=/dev/loop6 --bind=/dev/loop7 --bind=/dev/loop8 --bind=/dev/loop9 --bind=/dev/loop10 --bind=/dev/loop11 --console=pipe --setenv=TERM=vt100 --setenv=SHELL=/bin/bash --setenv=HOME=/builddir --setenv=HOSTNAME=mock --setenv=PATH=/usr/bin:/bin:/usr/sbin:/sbin '--setenv=PROMPT_COMMAND=printf "\033]0;\007"' '--setenv=PS1= \s-\v\$ ' --setenv=LANG=C.UTF-8 --resolv-conf=off bash --login -c '/usr/bin/rpmbuild -ba --noprep --target x86_64 /builddir/build/originals/python-django-allauth.spec' Copr build error: Build failed