@@ -71,7 +71,7 @@ def test_filefield_dangerous_filename(self):
7171 ]
7272 f = FileField (upload_to = 'some/folder/' )
7373 for file_name , msg_file_name in candidates :
74- msg = f "Could not derive file name from '{ msg_file_name } '"
74+ msg = "Could not derive file name from '%s'" % msg_file_name
7575 with self .subTest (file_name = file_name ):
7676 with self .assertRaisesMessage (SuspiciousFileOperation , msg ):
7777 f .generate_filename (None , file_name )
@@ -89,7 +89,7 @@ def test_filefield_generate_filename_absolute_path(self):
8989 '/tmp/../path' ,
9090 ]
9191 for file_name in candidates :
92- msg = f "Detected path traversal attempt in '{ file_name } '"
92+ msg = "Detected path traversal attempt in '%s'" % file_name
9393 with self .subTest (file_name = file_name ):
9494 with self .assertRaisesMessage (SuspiciousFileOperation , msg ):
9595 f .generate_filename (None , file_name )
@@ -145,7 +145,7 @@ def upload_to(instance, filename):
145145 '$.$.$' ,
146146 ]
147147 for file_name in candidates :
148- msg = f "Detected path traversal attempt in '/tmp/{ file_name } '"
148+ msg = "Detected path traversal attempt in '/tmp/%s'" % file_name
149149 with self .subTest (file_name = file_name ):
150150 with self .assertRaisesMessage (SuspiciousFileOperation , msg ):
151151 f .generate_filename (None , file_name )
@@ -157,7 +157,7 @@ def upload_to(instance, filename):
157157 f = FileField (upload_to = upload_to )
158158 candidates = ['..' , '.' , '' ]
159159 for file_name in candidates :
160- msg = f "Could not derive file name from '/tmp/{ file_name } '"
160+ msg = "Could not derive file name from '/tmp/%s'" % file_name
161161 with self .subTest (file_name = file_name ):
162162 with self .assertRaisesMessage (SuspiciousFileOperation , msg ):
163163 f .generate_filename (None , file_name )
0 commit comments