File invalid-escapes-in-tests.patch of Package python-aiohttp.19333

--- a/tests/test_http_parser.py
+++ b/tests/test_http_parser.py
@@ -369,7 +369,7 @@ def test_max_header_field_size(parser, s
     name = b't' * size
     text = (b'GET /test HTTP/1.1\r\n' + name + b':data\r\n\r\n')
 
-    match = ("400, message='Got more than 8190 bytes \({}\) when reading"
+    match = (r"400, message='Got more than 8190 bytes \({}\) when reading"
              .format(size))
     with pytest.raises(http_exceptions.LineTooLong, match=match):
         parser.feed_data(text)
@@ -399,7 +399,7 @@ def test_max_header_value_size(parser, s
     text = (b'GET /test HTTP/1.1\r\n'
             b'data:' + name + b'\r\n\r\n')
 
-    match = ("400, message='Got more than 8190 bytes \({}\) when reading"
+    match = (r"400, message='Got more than 8190 bytes \({}\) when reading"
              .format(size))
     with pytest.raises(http_exceptions.LineTooLong, match=match):
         parser.feed_data(text)
@@ -430,7 +430,7 @@ def test_max_header_value_size_continuat
     text = (b'GET /test HTTP/1.1\r\n'
             b'data: test\r\n ' + name + b'\r\n\r\n')
 
-    match = ("400, message='Got more than 8190 bytes \({}\) when reading"
+    match = (r"400, message='Got more than 8190 bytes \({}\) when reading"
              .format(size))
     with pytest.raises(http_exceptions.LineTooLong, match=match):
         parser.feed_data(text)
@@ -551,7 +551,7 @@ def test_http_request_parser_bad_version
 @pytest.mark.parametrize('size', [40965, 8191])
 def test_http_request_max_status_line(parser, size):
     path = b't' * (size - 5)
-    match = ("400, message='Got more than 8190 bytes \({}\) when reading"
+    match = (r"400, message='Got more than 8190 bytes \({}\) when reading"
              .format(size))
     with pytest.raises(http_exceptions.LineTooLong, match=match):
         parser.feed_data(
@@ -595,7 +595,7 @@ def test_http_response_parser_utf8(respo
 @pytest.mark.parametrize('size', [40962, 8191])
 def test_http_response_parser_bad_status_line_too_long(response, size):
     reason = b't' * (size - 2)
-    match = ("400, message='Got more than 8190 bytes \({}\) when reading"
+    match = (r"400, message='Got more than 8190 bytes \({}\) when reading"
              .format(size))
     with pytest.raises(http_exceptions.LineTooLong, match=match):
         response.feed_data(
--- a/tests/test_streams.py
+++ b/tests/test_streams.py
@@ -721,7 +721,7 @@ class TestStreamReader:
     async def test___repr__waiter(self, loop):
         stream = self._make_one()
         stream._waiter = loop.create_future()
-        assert re.search("<StreamReader w=<Future pending[\S ]*>>",
+        assert re.search(r"<StreamReader w=<Future pending[\S ]*>>",
                          repr(stream))
         stream._waiter.set_result(None)
         await stream._waiter
--- a/tests/test_urldispatch.py
+++ b/tests/test_urldispatch.py
@@ -586,7 +586,7 @@ def test_add_route_with_invalid_re(route
 
 def test_route_dynamic_with_regex_spec(router):
     handler = make_handler()
-    route = router.add_route('GET', '/get/{num:^\d+}', handler,
+    route = router.add_route('GET', r'/get/{num:^\d+}', handler,
                              name='name')
 
     url = route.url_for(num='123')
@@ -595,7 +595,7 @@ def test_route_dynamic_with_regex_spec(r
 
 def test_route_dynamic_with_regex_spec_and_trailing_slash(router):
     handler = make_handler()
-    route = router.add_route('GET', '/get/{num:^\d+}/', handler,
+    route = router.add_route('GET', r'/get/{num:^\d+}/', handler,
                              name='name')
 
     url = route.url_for(num='123')
@@ -1125,7 +1125,7 @@ def test_plain_resource_canonical():
 def test_dynamic_resource_canonical():
     canonicals = {
         '/get/{name}': '/get/{name}',
-        '/get/{num:^\d+}': '/get/{num}',
+        r'/get/{num:^\d+}': '/get/{num}',
         r'/handler/{to:\d+}': r'/handler/{to}',
         r'/{one}/{two:.+}': r'/{one}/{two}',
     }
--- a/tests/test_web_request.py
+++ b/tests/test_web_request.py
@@ -340,7 +340,7 @@ def test_single_forwarded_header_multipl
 
 
 def test_single_forwarded_header_quoted_escaped():
-    header = 'BY=identifier;pROTO="\lala lan\d\~ 123\!&"'
+    header = r'BY=identifier;pROTO="\lala lan\d\~ 123\!&"'
     req = make_mocked_request('GET', '/',
                               headers=CIMultiDict({'Forwarded': header}))
     assert req.forwarded[0]['by'] == 'identifier'
openSUSE Build Service is sponsored by