@@ -398,7 +398,7 @@ def test_delegate_narrow_scope(
398398 delegate_to = agent_b .agent_id ,
399399 scope = ["read:data:partition-7" ],
400400 )
401- output .append (f " delegate() returned:" )
401+ output .append (" delegate() returned:" )
402402 output .append (f" access_token: { delegated .access_token [:30 ]} ..." )
403403 output .append (f" expires_in: { delegated .expires_in } s" )
404404 output .append (f" chain_length: { len (delegated .delegation_chain )} " )
@@ -582,7 +582,7 @@ def test_delegation_chain(
582582 delegate_to = agent_b .agent_id ,
583583 scope = ["read:data:partition-7" , "read:data:partition-8" ],
584584 )
585- output .append (f " delegate() A→B returned:" )
585+ output .append (" delegate() A→B returned:" )
586586 output .append (f" access_token: { delegated_ab .access_token [:30 ]} ..." )
587587 output .append (f" expires_in: { delegated_ab .expires_in } s" )
588588 output .append (f" chain_length: { len (delegated_ab .delegation_chain )} " )
@@ -615,7 +615,7 @@ def test_delegation_chain(
615615 hop2_data = hop2_resp .json ()
616616 delegated_bc_token = hop2_data ["access_token" ]
617617 delegated_bc_chain = hop2_data .get ("delegation_chain" , [])
618- output .append (f " Hop 2 returned:" )
618+ output .append (" Hop 2 returned:" )
619619 output .append (f" access_token: { delegated_bc_token [:30 ]} ..." )
620620 output .append (f" expires_in: { hop2_data ['expires_in' ]} s" )
621621 output .append (f" chain_length: { len (delegated_bc_chain )} " )
@@ -743,7 +743,7 @@ def test_delegate_all_scope(
743743 )
744744 broker_accepts = True
745745 output .append (" RESULT: Broker ACCEPTED full-scope delegation" )
746- output .append (f " delegate() returned:" )
746+ output .append (" delegate() returned:" )
747747 output .append (f" access_token: { delegated .access_token [:30 ]} ..." )
748748 output .append (f" expires_in: { delegated .expires_in } s" )
749749 output .append (f" chain_length: { len (delegated .delegation_chain )} " )
@@ -829,7 +829,7 @@ def test_scope_gating(self, client: AgentAuthApp) -> None:
829829 # Action 1: Read customer-artis (authorized)
830830 action_1 = ["read:data:customer-artis" ]
831831 allowed_1 = scope_is_subset (action_1 , agent .scope )
832- output .append (f " Action: read customer-artis" )
832+ output .append (" Action: read customer-artis" )
833833 output .append (f" Scope check: { allowed_1 } " )
834834 if allowed_1 :
835835 output .append (" PASS: Authorized action allowed" )
@@ -842,7 +842,7 @@ def test_scope_gating(self, client: AgentAuthApp) -> None:
842842 # Action 2: Read ALL customers (NOT authorized)
843843 action_2 = ["read:data:all-customers" ]
844844 allowed_2 = scope_is_subset (action_2 , agent .scope )
845- output .append (f " Action: read all-customers" )
845+ output .append (" Action: read all-customers" )
846846 output .append (f" Scope check: { allowed_2 } " )
847847 if not allowed_2 :
848848 output .append (" PASS: Unauthorized action blocked by scope check" )
@@ -855,7 +855,7 @@ def test_scope_gating(self, client: AgentAuthApp) -> None:
855855 # Action 3: Write to customer-artis (NOT authorized — agent has read only)
856856 action_3 = ["write:data:customer-artis" ]
857857 allowed_3 = scope_is_subset (action_3 , agent .scope )
858- output .append (f " Action: write customer-artis" )
858+ output .append (" Action: write customer-artis" )
859859 output .append (f" Scope check: { allowed_3 } " )
860860 if not allowed_3 :
861861 output .append (" PASS: Write blocked — agent has read-only scope" )
@@ -1158,7 +1158,7 @@ def test_multiple_agents_isolated(
11581158 output .append (f" sub: { result .claims .sub } " )
11591159 output .append (f" scope: { result .claims .scope } " )
11601160 if result .claims .scope != agent .scope :
1161- output .append (f " FAIL: Claims scope doesn't match agent scope" )
1161+ output .append (" FAIL: Claims scope doesn't match agent scope" )
11621162 passed = False
11631163 else :
11641164 output .append (f" FAIL: Token invalid — error={ result .error } " )
@@ -1313,7 +1313,7 @@ def test_validate_garbage_token(self, broker_url: str) -> None:
13131313 output .append (" FAIL: Broker accepted a garbage token" )
13141314 passed = False
13151315 except Exception as e :
1316- output .append (f " FAIL: SDK threw exception instead of returning ValidateResult" )
1316+ output .append (" FAIL: SDK threw exception instead of returning ValidateResult" )
13171317 output .append (f" Exception: { type (e ).__name__ } : { e } " )
13181318 passed = False
13191319
@@ -1357,7 +1357,7 @@ def test_health_check(self, client: AgentAuthApp) -> None:
13571357 passed = True
13581358
13591359 health = client .health ()
1360- output .append (f " health() returned:" )
1360+ output .append (" health() returned:" )
13611361 output .append (f" status: { health .status } " )
13621362 output .append (f" version: { health .version } " )
13631363 output .append (f" uptime: { health .uptime } s" )
0 commit comments