@@ -59,14 +59,14 @@ def test_end_to_end_prepared(self):
59
59
# A straight select from the database will now return the decrypted bits. We select both encrypted and unencrypted
60
60
# values here to confirm that we don't interfere with regular processing of unencrypted vals.
61
61
(encrypted ,unencrypted ) = session .execute ("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering" , (expected ,)).one ()
62
- self .assertEquals (expected , encrypted )
63
- self .assertEquals (expected , unencrypted )
62
+ self .assertEqual (expected , encrypted )
63
+ self .assertEqual (expected , unencrypted )
64
64
65
65
# Confirm the same behaviour from a subsequent prepared statement as well
66
66
prepared = session .prepare ("select encrypted, unencrypted from foo.bar where unencrypted = ? allow filtering" )
67
67
(encrypted ,unencrypted ) = session .execute (prepared , [expected ]).one ()
68
- self .assertEquals (expected , encrypted )
69
- self .assertEquals (expected , unencrypted )
68
+ self .assertEqual (expected , encrypted )
69
+ self .assertEqual (expected , unencrypted )
70
70
71
71
def test_end_to_end_simple (self ):
72
72
@@ -87,14 +87,14 @@ def test_end_to_end_simple(self):
87
87
# A straight select from the database will now return the decrypted bits. We select both encrypted and unencrypted
88
88
# values here to confirm that we don't interfere with regular processing of unencrypted vals.
89
89
(encrypted ,unencrypted ) = session .execute ("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering" , (expected ,)).one ()
90
- self .assertEquals (expected , encrypted )
91
- self .assertEquals (expected , unencrypted )
90
+ self .assertEqual (expected , encrypted )
91
+ self .assertEqual (expected , unencrypted )
92
92
93
93
# Confirm the same behaviour from a subsequent prepared statement as well
94
94
prepared = session .prepare ("select encrypted, unencrypted from foo.bar where unencrypted = ? allow filtering" )
95
95
(encrypted ,unencrypted ) = session .execute (prepared , [expected ]).one ()
96
- self .assertEquals (expected , encrypted )
97
- self .assertEquals (expected , unencrypted )
96
+ self .assertEqual (expected , encrypted )
97
+ self .assertEqual (expected , unencrypted )
98
98
99
99
def test_end_to_end_different_cle_contexts_different_ivs (self ):
100
100
"""
@@ -136,8 +136,8 @@ def test_end_to_end_different_cle_contexts_different_ivs(self):
136
136
cluster2 = TestCluster (column_encryption_policy = cl_policy2 )
137
137
session2 = cluster2 .connect ()
138
138
(encrypted ,unencrypted ) = session2 .execute ("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering" , (expected ,)).one ()
139
- self .assertEquals (expected , encrypted )
140
- self .assertEquals (expected , unencrypted )
139
+ self .assertEqual (expected , encrypted )
140
+ self .assertEqual (expected , unencrypted )
141
141
142
142
def test_end_to_end_different_cle_contexts_different_policies (self ):
143
143
"""
@@ -162,10 +162,10 @@ def test_end_to_end_different_cle_contexts_different_policies(self):
162
162
# A straight select from the database will now return the decrypted bits. We select both encrypted and unencrypted
163
163
# values here to confirm that we don't interfere with regular processing of unencrypted vals.
164
164
(encrypted ,unencrypted ) = session2 .execute ("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering" , (expected ,)).one ()
165
- self .assertEquals (cl_policy .encode_and_encrypt (col_desc , expected ), encrypted )
166
- self .assertEquals (expected , unencrypted )
165
+ self .assertEqual (cl_policy .encode_and_encrypt (col_desc , expected ), encrypted )
166
+ self .assertEqual (expected , unencrypted )
167
167
168
168
# Confirm the same behaviour from a subsequent prepared statement as well
169
169
prepared = session2 .prepare ("select encrypted, unencrypted from foo.bar where unencrypted = ? allow filtering" )
170
170
(encrypted ,unencrypted ) = session2 .execute (prepared , [expected ]).one ()
171
- self .assertEquals (cl_policy .encode_and_encrypt (col_desc , expected ), encrypted )
171
+ self .assertEqual (cl_policy .encode_and_encrypt (col_desc , expected ), encrypted )
0 commit comments