@@ -63,8 +63,7 @@ def pick_best(self, request_versions):
63
63
req_klass .API_VERSION <= supported_versions [1 ]:
64
64
return req_klass
65
65
raise Errors .KafkaError (
66
- "Could not pick a version for API_KEY={} from {}. " .format (
67
- api_key , supported_versions )
66
+ f"Could not pick a version for API_KEY={ api_key } from { supported_versions } ."
68
67
)
69
68
70
69
@@ -184,7 +183,7 @@ def __init__(self, host, port, *, client_id='aiokafka',
184
183
# that
185
184
def __del__ (self , _warnings = warnings ):
186
185
if self .connected ():
187
- _warnings .warn ("Unclosed AIOKafkaConnection {!r}" . format ( self ) ,
186
+ _warnings .warn (f "Unclosed AIOKafkaConnection { self !r} " ,
188
187
ResourceWarning ,
189
188
source = self )
190
189
if self ._loop .is_closed ():
@@ -242,8 +241,8 @@ async def _do_version_lookup(self):
242
241
versions = {}
243
242
for api_key , min_version , max_version in response .api_versions :
244
243
assert min_version <= max_version , (
245
- "{ } should be less than or equal to {} for {}" . format (
246
- min_version , max_version , api_key )
244
+ f" { min_version } should be less than"
245
+ f" or equal to { max_version } for { api_key } "
247
246
)
248
247
versions [api_key ] = (min_version , max_version )
249
248
self ._version_info = VersionInfo (versions )
@@ -270,9 +269,9 @@ async def _do_sasl_handshake(self):
270
269
271
270
if self ._sasl_mechanism not in response .enabled_mechanisms :
272
271
exc = Errors .UnsupportedSaslMechanismError (
273
- ' Kafka broker does not support %s sasl mechanism. '
274
- ' Enabled mechanisms are: %s'
275
- % ( self . _sasl_mechanism , response . enabled_mechanisms ) )
272
+ f" Kafka broker does not support { self . _sasl_mechanism } sasl "
273
+ f"mechanism. Enabled mechanisms are: { response . enabled_mechanisms } "
274
+ )
276
275
self .close (reason = CloseReason .AUTH_FAILURE , exc = exc )
277
276
raise exc
278
277
@@ -364,7 +363,7 @@ def sasl_principal(self):
364
363
service = self ._sasl_kerberos_service_name
365
364
domain = self ._sasl_kerberos_domain_name or self .host
366
365
367
- return "{service}@{domain}" . format ( service = service , domain = domain )
366
+ return f "{ service } @{ domain } "
368
367
369
368
@staticmethod
370
369
def _on_read_task_error (self_ref , read_task ):
@@ -401,7 +400,7 @@ def _idle_check(self_ref):
401
400
wake_up_in , self ._idle_check , self_ref )
402
401
403
402
def __repr__ (self ):
404
- return "<AIOKafkaConnection host={0 .host} port={0 .port}>" . format ( self )
403
+ return f "<AIOKafkaConnection host={ self .host } port={ self .port } >"
405
404
406
405
@property
407
406
def host (self ):
@@ -414,8 +413,8 @@ def port(self):
414
413
def send (self , request , expect_response = True ):
415
414
if self ._writer is None :
416
415
raise Errors .KafkaConnectionError (
417
- "No connection to broker at {0 }:{1 }"
418
- . format ( self . _host , self . _port ) )
416
+ f "No connection to broker at { self . _host } :{ self . _port } "
417
+ )
419
418
420
419
correlation_id = self ._next_correlation_id ()
421
420
header = RequestHeader (request ,
@@ -428,8 +427,8 @@ def send(self, request, expect_response=True):
428
427
except OSError as err :
429
428
self .close (reason = CloseReason .CONNECTION_BROKEN )
430
429
raise Errors .KafkaConnectionError (
431
- "Connection at {0 }:{1 } broken: {2}" . format (
432
- self . _host , self . _port , err ) )
430
+ f "Connection at { self . _host } :{ self . _port } broken: { err } "
431
+ )
433
432
434
433
self .log .debug (
435
434
'%s Request %d: %s' , self , correlation_id , request )
@@ -443,17 +442,16 @@ def send(self, request, expect_response=True):
443
442
def _send_sasl_token (self , payload , expect_response = True ):
444
443
if self ._writer is None :
445
444
raise Errors .KafkaConnectionError (
446
- "No connection to broker at {0}:{1}"
447
- .format (self ._host , self ._port ))
448
-
445
+ f"No connection to broker at { self ._host } :{ self ._port } "
446
+ )
449
447
size = struct .pack (">i" , len (payload ))
450
448
try :
451
449
self ._writer .write (size + payload )
452
450
except OSError as err :
453
451
self .close (reason = CloseReason .CONNECTION_BROKEN )
454
452
raise Errors .KafkaConnectionError (
455
- "Connection at {0 }:{1 } broken: {2}" . format (
456
- self . _host , self . _port , err ) )
453
+ f "Connection at { self . _host } :{ self . _port } broken: { err } "
454
+ )
457
455
458
456
if not expect_response :
459
457
return self ._writer .drain ()
@@ -476,8 +474,8 @@ def close(self, reason=None, exc=None):
476
474
for _ , _ , fut in self ._requests :
477
475
if not fut .done ():
478
476
error = Errors .KafkaConnectionError (
479
- "Connection at {0 }:{1 } closed" . format (
480
- self . _host , self . _port ) )
477
+ f "Connection at { self . _host } :{ self . _port } closed"
478
+ )
481
479
if exc is not None :
482
480
error .__cause__ = exc
483
481
error .__context__ = exc
@@ -536,8 +534,9 @@ def _handle_frame(self, resp):
536
534
537
535
elif correlation_id != recv_correlation_id :
538
536
error = Errors .CorrelationIdError (
539
- 'Correlation ids do not match: sent {}, recv {}'
540
- .format (correlation_id , recv_correlation_id ))
537
+ f"Correlation ids do not match: sent { correlation_id } ,"
538
+ f" recv { recv_correlation_id } "
539
+ )
541
540
if not fut .done ():
542
541
fut .set_exception (error )
543
542
self .close (reason = CloseReason .OUT_OF_SYNC )
@@ -660,8 +659,7 @@ def __init__(self, *, loop, sasl_plain_password,
660
659
self ._authenticator = self .authenticator_scram ()
661
660
662
661
def first_message (self ):
663
- client_first_bare = 'n={},r={}' .format (
664
- self ._sasl_plain_username , self ._nonce )
662
+ client_first_bare = f"n={ self ._sasl_plain_username } ,r={ self ._nonce } "
665
663
self ._auth_message += client_first_bare
666
664
return 'n,,' + client_first_bare
667
665
@@ -689,8 +687,8 @@ def process_server_first_message(self, server_first):
689
687
self ._server_key , self ._auth_message .encode ('utf-8' ))
690
688
691
689
def final_message (self ):
692
- return 'c=biws,r={},p={}' . format (
693
- self ._nonce , base64 . b64encode ( self . _client_proof ). decode ( 'utf-8' ))
690
+ client_proof = base64 . b64encode ( self . _client_proof ). decode ( 'utf-8' )
691
+ return f"c=biws,r= { self ._nonce } ,p= { client_proof } "
694
692
695
693
def process_server_final_message (self , server_final ):
696
694
params = dict (pair .split ('=' , 1 ) for pair in server_final .split (',' ))
@@ -734,9 +732,7 @@ async def step(self, payload):
734
732
.encode ("utf-8" ), True
735
733
736
734
def _build_oauth_client_request (self , token , token_extensions ):
737
- return "n,,\x01 auth=Bearer {}{}\x01 \x01 " .format (
738
- token , token_extensions
739
- )
735
+ return f"n,,\x01 auth=Bearer { token } { token_extensions } \x01 \x01 "
740
736
741
737
def _token_extensions (self ):
742
738
"""
@@ -751,7 +747,7 @@ def _token_extensions(self):
751
747
extensions = self ._sasl_oauth_token_provider .extensions ()
752
748
if len (extensions ) > 0 :
753
749
msg = "\x01 " .join (
754
- ["{ }={}" . format ( k , v ) for k , v in extensions .items ()])
750
+ [f" { k } ={ v } " for k , v in extensions .items ()])
755
751
return "\x01 " + msg
756
752
757
753
return ""
0 commit comments