This is an automated email from the ASF dual-hosted git repository.
vincbeck pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/airflow.git
The following commit(s) were added to refs/heads/main by this push:
new dc228f9233 Fix test `test_cli_import_roles` (#36558)
dc228f9233 is described below
commit dc228f923392f626932f960faee1a8eb3f1678ea
Author: Vincent <[email protected]>
AuthorDate: Wed Jan 3 11:36:00 2024 -0500
Fix test `test_cli_import_roles` (#36558)
---
.../auth_manager/cli_commands/test_role_command.py | 21 +++++++++++++++------
1 file changed, 15 insertions(+), 6 deletions(-)
diff --git a/tests/providers/fab/auth_manager/cli_commands/test_role_command.py
b/tests/providers/fab/auth_manager/cli_commands/test_role_command.py
index a6bf870d6d..1e7e655ef8 100644
--- a/tests/providers/fab/auth_manager/cli_commands/test_role_command.py
+++ b/tests/providers/fab/auth_manager/cli_commands/test_role_command.py
@@ -194,9 +194,18 @@ class TestCliRoles:
assert fakeTeamB is not None
assert len(fakeTeamB.permissions) == 0
assert len(fakeTeamA.permissions) == 3
- assert fakeTeamA.permissions[0].resource.name ==
permissions.RESOURCE_POOL
- assert fakeTeamA.permissions[0].action.name ==
permissions.ACTION_CAN_EDIT
- assert fakeTeamA.permissions[1].resource.name ==
permissions.RESOURCE_POOL
- assert fakeTeamA.permissions[1].action.name ==
permissions.ACTION_CAN_READ
- assert fakeTeamA.permissions[2].resource.name ==
permissions.RESOURCE_ADMIN_MENU
- assert fakeTeamA.permissions[2].action.name ==
permissions.ACTION_CAN_ACCESS_MENU
+ assert any(
+ permission.resource.name == permissions.RESOURCE_POOL
+ and permission.action.name == permissions.ACTION_CAN_EDIT
+ for permission in fakeTeamA.permissions
+ )
+ assert any(
+ permission.resource.name == permissions.RESOURCE_POOL
+ and permission.action.name == permissions.ACTION_CAN_READ
+ for permission in fakeTeamA.permissions
+ )
+ assert any(
+ permission.resource.name == permissions.RESOURCE_ADMIN_MENU
+ and permission.action.name == permissions.ACTION_CAN_ACCESS_MENU
+ for permission in fakeTeamA.permissions
+ )