@@ -21,6 +21,7 @@ and adding information about columns to be encrypted to it. This policy is then
21
21
when it's created.
22
22
23
23
.. code-block :: python
24
+
24
25
import os
25
26
26
27
from cassandra.policies import ColDesc, AES256ColumnEncryptionPolicy, AES256_KEY_SIZE_BYTES
@@ -57,6 +58,7 @@ supplied parameters. For example, we can create a prepared statement to insert
57
58
by executing the following code after creating a :class: `~.Cluster ` in the manner described above:
58
59
59
60
.. code-block :: python
61
+
60
62
session = cluster.connect()
61
63
prepared = session.prepare(" insert into ks1.table1 (column1) values (?)" )
62
64
session.execute(prepared, (1000 ,))
@@ -70,6 +72,7 @@ standard serialization methods employed by the driver. The result is then encry
70
72
of the policy. Using this approach the example above could be implemented along the lines of the following:
71
73
72
74
.. code-block :: python
75
+
73
76
session = cluster.connect()
74
77
session.execute(" insert into ks1.table1 (column1) values (%s )" ,(cl_policy.encode_and_encrypt(col_desc, 1000 ),))
75
78
@@ -88,4 +91,4 @@ of the cryptography package, although wheels exist for many common platforms.
88
91
89
92
Client-side encryption has been implemented for both the default Cython and pure Python row processing logic.
90
93
This functionality has not yet been ported to the NumPy Cython implementation. During testing,
91
- the NumPy processing works on Python 3.7 but fails for Python 3.8.
94
+ the NumPy processing works on Python 3.7 but fails for Python 3.8.
0 commit comments