diff --git a/server/backend/testspg/conftest.py b/server/backend/testspg/conftest.py index b84430a30..cc7ad8835 100644 --- a/server/backend/testspg/conftest.py +++ b/server/backend/testspg/conftest.py @@ -7,7 +7,6 @@ import pytest import starlette import testcontainers.compose -from api.app.schemas.fam_user import FamUserSchema from Crypto.PublicKey import RSA from fastapi.testclient import TestClient from mock_alchemy.mocking import UnifiedAlchemyMagicMock @@ -27,6 +26,7 @@ enforce_bceid_terms_conditions_guard, get_current_requester, get_verified_target_user) from api.app.schemas import RequesterSchema, TargetUserSchema +from api.app.schemas.fam_user import FamUserSchema from testspg.constants import (ACCESS_GRANT_FOM_DEV_CR_IDIR, FOM_DEV_ADMIN_ROLE, FOM_TEST_ADMIN_ROLE, TEST_CREATOR) diff --git a/server/backend/testspg/crud/services/test_permission_audit_service.py b/server/backend/testspg/crud/services/test_permission_audit_service.py index e7169ed49..5d5019fa0 100644 --- a/server/backend/testspg/crud/services/test_permission_audit_service.py +++ b/server/backend/testspg/crud/services/test_permission_audit_service.py @@ -282,10 +282,7 @@ def test_store_end_user_audit_history_revoke_role_client_search_error( + f"Unknown forest client number {mock_delete_record.role.client_number.forest_client_number} for " + f"scoped permission {mock_delete_record.role.role_name}." ) - assert ( - str(e.value.detail.get("description")).find(error_msg) - != -1 - ) + assert str(e.value.detail.get("description")).find(error_msg) != -1 assert forest_client_integration_fn_spy.call_count == 1 # find the audit record and verify audit_record = db_pg_session.query(FamPrivilegeChangeAudit).filter(