@@ -119,7 +119,7 @@ def test_update_datasource_default_permission(self) -> None:
119
119
120
120
capabilities = {TSC .Permission .Capability .ExportXml : TSC .Permission .Mode .Deny }
121
121
122
- rules = [TSC .PermissionsRule (grantee = group , capabilities = capabilities )]
122
+ rules = [TSC .PermissionsRule (grantee = group . to_reference () , capabilities = capabilities )] # type: ignore[arg-type ]
123
123
124
124
new_rules = self .server .projects .update_datasource_default_permissions (project , rules )
125
125
@@ -236,7 +236,7 @@ def test_delete_permission(self) -> None:
236
236
if permission .grantee .id == single_group ._id :
237
237
capabilities = permission .capabilities
238
238
239
- rules = TSC .PermissionsRule (grantee = single_group , capabilities = capabilities )
239
+ rules = TSC .PermissionsRule (grantee = single_group . to_reference () , capabilities = capabilities )
240
240
241
241
endpoint = "{}/permissions/groups/{}" .format (single_project ._id , single_group ._id )
242
242
m .delete ("{}/{}/Read/Allow" .format (self .baseurl , endpoint ), status_code = 204 )
@@ -282,7 +282,7 @@ def test_delete_workbook_default_permission(self) -> None:
282
282
TSC .Permission .Capability .ChangePermissions : TSC .Permission .Mode .Allow ,
283
283
}
284
284
285
- rules = TSC .PermissionsRule (grantee = single_group , capabilities = capabilities )
285
+ rules = TSC .PermissionsRule (grantee = single_group . to_reference () , capabilities = capabilities ) # type: ignore[arg-type]
286
286
287
287
endpoint = "{}/default-permissions/workbooks/groups/{}" .format (single_project ._id , single_group ._id )
288
288
m .delete ("{}/{}/Read/Allow" .format (self .baseurl , endpoint ), status_code = 204 )
0 commit comments