From: Pablo Galindo Salgado Date: Thu, 15 Jun 2023 10:48:01 +0000 (+0100) Subject: gh-105821: Use a raw f-string in test_httpservers.py (#105822) X-Git-Tag: v3.13.0a1~1725 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=09ce8c3b48f940eb8865330f029b8069854c3106;p=thirdparty%2FPython%2Fcpython.git gh-105821: Use a raw f-string in test_httpservers.py (#105822) Use a raw f-string in test_httpservers.py --- diff --git a/Lib/test/test_httpservers.py b/Lib/test/test_httpservers.py index cdd1bea754a0..cfd8a101dcc1 100644 --- a/Lib/test/test_httpservers.py +++ b/Lib/test/test_httpservers.py @@ -442,10 +442,10 @@ class SimpleHTTPServerTestCase(BaseTestCase): def test_undecodable_parameter(self): # sanity check using a valid parameter response = self.request(self.base_url + '/?x=123').read() - self.assertRegex(response, f'listing for {self.base_url}/\?x=123'.encode('latin1')) + self.assertRegex(response, rf'listing for {self.base_url}/\?x=123'.encode('latin1')) # now the bogus encoding response = self.request(self.base_url + '/?x=%bb').read() - self.assertRegex(response, f'listing for {self.base_url}/\?x=\xef\xbf\xbd'.encode('latin1')) + self.assertRegex(response, rf'listing for {self.base_url}/\?x=\xef\xbf\xbd'.encode('latin1')) def test_get_dir_redirect_location_domain_injection_bug(self): """Ensure //evil.co/..%2f../../X does not put //evil.co/ in Location.