aboutsummaryrefslogtreecommitdiff
path: root/modules/safe.py
diff options
context:
space:
mode:
authorAUTOMATIC1111 <16777216c@gmail.com>2022-12-25 09:16:08 +0300
committerGitHub <noreply@github.com>2022-12-25 09:16:08 +0300
commitb12de850ae8bcd6f99817c6622b4cd2f04410ff5 (patch)
treedf26b5510f07b645e7edf68c47220f595ef5a538 /modules/safe.py
parenta66514e1a35a3d140e6242e553b5fd0c5bec42f4 (diff)
parent3bf5591efe9a9f219c6088be322a87adc4f48f95 (diff)
Merge pull request #5992 from yuvalabou/F541
Fix F541: f-string without any placeholders
Diffstat (limited to 'modules/safe.py')
-rw-r--r--modules/safe.py8
1 files changed, 4 insertions, 4 deletions
diff --git a/modules/safe.py b/modules/safe.py
index ec23a53c..82d44be3 100644
--- a/modules/safe.py
+++ b/modules/safe.py
@@ -137,15 +137,15 @@ def load_with_extra(filename, extra_handler=None, *args, **kwargs):
except pickle.UnpicklingError:
print(f"Error verifying pickled file from {filename}:", file=sys.stderr)
print(traceback.format_exc(), file=sys.stderr)
- print(f"-----> !!!! The file is most likely corrupted !!!! <-----", file=sys.stderr)
- print(f"You can skip this check with --disable-safe-unpickle commandline argument, but that is not going to help you.\n\n", file=sys.stderr)
+ print("-----> !!!! The file is most likely corrupted !!!! <-----", file=sys.stderr)
+ print("You can skip this check with --disable-safe-unpickle commandline argument, but that is not going to help you.\n\n", file=sys.stderr)
return None
except Exception:
print(f"Error verifying pickled file from {filename}:", file=sys.stderr)
print(traceback.format_exc(), file=sys.stderr)
- print(f"\nThe file may be malicious, so the program is not going to read it.", file=sys.stderr)
- print(f"You can skip this check with --disable-safe-unpickle commandline argument.\n\n", file=sys.stderr)
+ print("\nThe file may be malicious, so the program is not going to read it.", file=sys.stderr)
+ print("You can skip this check with --disable-safe-unpickle commandline argument.\n\n", file=sys.stderr)
return None
return unsafe_torch_load(filename, *args, **kwargs)