|
6 | 6 | from databricks.labs.ucx.config import GroupsConfig |
7 | 7 | from databricks.labs.ucx.hive_metastore import GrantsCrawler, TablesCrawler |
8 | 8 | from databricks.labs.ucx.workspace_access.generic import ( |
9 | | - GenericPermissionsSupport, |
10 | | - listing_wrapper, |
| 9 | + GenericPermissionsSupport, Listing, |
11 | 10 | ) |
12 | 11 | from databricks.labs.ucx.workspace_access.groups import GroupManager |
13 | 12 | from databricks.labs.ucx.workspace_access.manager import PermissionManager |
@@ -88,11 +87,9 @@ def test_replace_workspace_groups_with_account_groups( |
88 | 87 | group_info = group_manager.migration_state.get_by_workspace_group_name(ws_group.display_name) |
89 | 88 |
|
90 | 89 | generic_permissions = GenericPermissionsSupport( |
91 | | - ws, [listing_wrapper(ws.cluster_policies.list, "policy_id", "cluster-policies")] |
92 | | - ) |
93 | | - permission_manager = PermissionManager( |
94 | | - sql_backend, inventory_schema, [generic_permissions], {"cluster-policies": generic_permissions} |
| 90 | + ws, [Listing(ws.cluster_policies.list, "policy_id", "cluster-policies")] |
95 | 91 | ) |
| 92 | + permission_manager = PermissionManager(sql_backend, inventory_schema, [generic_permissions]) |
96 | 93 | tables = TablesCrawler(sql_backend, inventory_schema) |
97 | 94 | grants = GrantsCrawler(tables) |
98 | 95 |
|
@@ -167,10 +164,8 @@ def test_recover_from_ws_local_deletion(ws, make_ucx_group): |
167 | 164 | group_manager = GroupManager(ws, GroupsConfig(auto=True)) |
168 | 165 | group_manager.prepare_groups_in_environment() |
169 | 166 |
|
170 | | - migration_state = group_manager.migration_groups_provider |
171 | | - |
172 | 167 | recovered_state = {} |
173 | | - for gi in migration_state.groups: |
| 168 | + for gi in group_manager.migration_state.groups: |
174 | 169 | recovered_state[gi.workspace.display_name] = gi.workspace |
175 | 170 |
|
176 | 171 | assert sorted([member.display for member in ws_group.members]) == sorted( |
|
0 commit comments