]> git.ipfire.org Git - thirdparty/samba.git/commitdiff
python:tests: Remove unnecessary f‐strings
authorJoseph Sutton <josephsutton@catalyst.net.nz>
Tue, 24 Oct 2023 03:32:31 +0000 (16:32 +1300)
committerAndrew Bartlett <abartlet@samba.org>
Wed, 25 Oct 2023 22:23:37 +0000 (22:23 +0000)
Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
python/samba/tests/dns_packet.py
python/samba/tests/krb5/authn_policy_tests.py
python/samba/tests/samba_tool/domain_auth_silo.py

index ae7bcb3ad8c1ff254662a42133bd23a3274a3b2d..61d5aabcc9de51ddb885bb8db50cc57ae90d8280 100644 (file)
@@ -133,7 +133,7 @@ class TestDnsPacketBase(TestCase):
         # unresponsive.
         if r != [s]:
             ok = self._known_good_query()
-            self.assertTrue(ok, f"the server is unresponsive")
+            self.assertTrue(ok, "the server is unresponsive")
 
     def _known_good_query(self):
         if self.server[1] == 53:
@@ -167,7 +167,7 @@ class TestDnsPacketBase(TestCase):
         # but it is not reasonable to render the server
         # unresponsive.
         ok = self._known_good_query()
-        self.assertTrue(ok, f"the server is unresponsive")
+        self.assertTrue(ok, "the server is unresponsive")
 
 
 class TestDnsPackets(TestDnsPacketBase):
index 8c5216ec7be4e00d6251dbdb445e238721213a27..3d70e9a730c7116c46c3f5564dc500b01cceb207 100755 (executable)
@@ -5033,7 +5033,7 @@ class AuthnPolicyTests(AuthnPolicyBaseTests):
 
         # Create an authentication policy that applies to a user and explicitly
         # denies authentication with any device.
-        denied = f'O:SYD:(D;;CR;;;WD)'
+        denied = 'O:SYD:(D;;CR;;;WD)'
         policy = self.create_authn_policy(enforced=True,
                                           user_allowed_from=denied)
 
@@ -5319,7 +5319,7 @@ class AuthnPolicyTests(AuthnPolicyBaseTests):
 
         # Create an authentication policy that applies to a user and explicitly
         # denies authentication with any device.
-        denied = f'O:SYD:(D;;CR;;;WD)'
+        denied = 'O:SYD:(D;;CR;;;WD)'
         policy = self.create_authn_policy(enforced=True,
                                           user_allowed_from=denied)
 
@@ -5411,7 +5411,7 @@ class AuthnPolicyTests(AuthnPolicyBaseTests):
 
         # Create an authentication policy that applies to a user and explicitly
         # denies authentication with any device.
-        denied = f'O:SYD:(D;;CR;;;WD)'
+        denied = 'O:SYD:(D;;CR;;;WD)'
         policy = self.create_authn_policy(enforced=True,
                                           user_allowed_from=denied)
 
index 668f8bf9c1de416da1f3c92bf8fdb3a8d9bda70d..c1d73058b437af02ef735e4a3f7289d324e6bab3 100644 (file)
@@ -216,7 +216,7 @@ class AuthSiloCmdTestCase(BaseAuthCmdTest):
                                        "--name", "policyNotFound",
                                        "--policy", "Invalid Policy")
         self.assertEqual(result, -1)
-        self.assertIn(f"Authentication policy Invalid Policy not found.", err)
+        self.assertIn("Authentication policy Invalid Policy not found.", err)
 
     def test_authentication_silo_create_fails(self):
         """Test creating an authentication silo, but it fails."""