@@ -119,7 +119,7 @@ def test_update_datasource_default_permission(self) -> None:
119119
120120 capabilities = {TSC .Permission .Capability .ExportXml : TSC .Permission .Mode .Deny }
121121
122- rules = [TSC .PermissionsRule (grantee = group , capabilities = capabilities )]
122+ rules = [TSC .PermissionsRule (grantee = group . to_reference () , capabilities = capabilities )] # type: ignore[arg-type ]
123123
124124 new_rules = self .server .projects .update_datasource_default_permissions (project , rules )
125125
@@ -236,7 +236,7 @@ def test_delete_permission(self) -> None:
236236 if permission .grantee .id == single_group ._id :
237237 capabilities = permission .capabilities
238238
239- rules = TSC .PermissionsRule (grantee = single_group , capabilities = capabilities )
239+ rules = TSC .PermissionsRule (grantee = single_group . to_reference () , capabilities = capabilities )
240240
241241 endpoint = "{}/permissions/groups/{}" .format (single_project ._id , single_group ._id )
242242 m .delete ("{}/{}/Read/Allow" .format (self .baseurl , endpoint ), status_code = 204 )
@@ -282,7 +282,7 @@ def test_delete_workbook_default_permission(self) -> None:
282282 TSC .Permission .Capability .ChangePermissions : TSC .Permission .Mode .Allow ,
283283 }
284284
285- rules = TSC .PermissionsRule (grantee = single_group , capabilities = capabilities )
285+ rules = TSC .PermissionsRule (grantee = single_group . to_reference () , capabilities = capabilities ) # type: ignore[arg-type]
286286
287287 endpoint = "{}/default-permissions/workbooks/groups/{}" .format (single_project ._id , single_group ._id )
288288 m .delete ("{}/{}/Read/Allow" .format (self .baseurl , endpoint ), status_code = 204 )
0 commit comments