@@ -1042,9 +1042,9 @@ def test_hook_uses_shell_not_from_cwd(self, rw_dir, case):
10421042# architecture, and generating one in a bespoke way may cause virus scanners to
10431043# give a false positive. So we use a Bash/Python polyglot for the hook and use
10441044# the Python interpreter itself as the bash.exe impostor. But an interpreter
1045- # from a venv may not run outside of it, and a global interpreter won't run from
1046- # a different location if it was installed from the Microsoft Store. So we make
1047- # a new venv in rw_dir and use its interpreter.
1045+ # from a venv may not runwhen copied outside of it, and a global interpreter
1046+ #won't run when copied to a different location if it was installed from the
1047+ #Microsoft Store. So we make a new venv in rw_dir and use its interpreter.
10481048venv = VirtualEnvironment (rw_dir ,with_pip = False )
10491049shutil .copy (venv .python ,Path (rw_dir ,shell_name ))
10501050shutil .copy (fixture_path ("polyglot" ),hook_path ("polyglot" ,repo .git_dir ))