@@ -58,14 +58,14 @@ def test_end_to_end_prepared(self):
58
58
# A straight select from the database will now return the decrypted bits. We select both encrypted and unencrypted
59
59
# values here to confirm that we don't interfere with regular processing of unencrypted vals.
60
60
(encrypted ,unencrypted ) = session .execute ("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering" , (expected ,)).one ()
61
- self .assertEquals (expected , encrypted )
62
- self .assertEquals (expected , unencrypted )
61
+ self .assertEqual (expected , encrypted )
62
+ self .assertEqual (expected , unencrypted )
63
63
64
64
# Confirm the same behaviour from a subsequent prepared statement as well
65
65
prepared = session .prepare ("select encrypted, unencrypted from foo.bar where unencrypted = ? allow filtering" )
66
66
(encrypted ,unencrypted ) = session .execute (prepared , [expected ]).one ()
67
- self .assertEquals (expected , encrypted )
68
- self .assertEquals (expected , unencrypted )
67
+ self .assertEqual (expected , encrypted )
68
+ self .assertEqual (expected , unencrypted )
69
69
70
70
def test_end_to_end_simple (self ):
71
71
@@ -86,14 +86,14 @@ def test_end_to_end_simple(self):
86
86
# A straight select from the database will now return the decrypted bits. We select both encrypted and unencrypted
87
87
# values here to confirm that we don't interfere with regular processing of unencrypted vals.
88
88
(encrypted ,unencrypted ) = session .execute ("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering" , (expected ,)).one ()
89
- self .assertEquals (expected , encrypted )
90
- self .assertEquals (expected , unencrypted )
89
+ self .assertEqual (expected , encrypted )
90
+ self .assertEqual (expected , unencrypted )
91
91
92
92
# Confirm the same behaviour from a subsequent prepared statement as well
93
93
prepared = session .prepare ("select encrypted, unencrypted from foo.bar where unencrypted = ? allow filtering" )
94
94
(encrypted ,unencrypted ) = session .execute (prepared , [expected ]).one ()
95
- self .assertEquals (expected , encrypted )
96
- self .assertEquals (expected , unencrypted )
95
+ self .assertEqual (expected , encrypted )
96
+ self .assertEqual (expected , unencrypted )
97
97
98
98
def test_end_to_end_different_cle_contexts_different_ivs (self ):
99
99
"""
@@ -135,8 +135,8 @@ def test_end_to_end_different_cle_contexts_different_ivs(self):
135
135
cluster2 = TestCluster (column_encryption_policy = cl_policy2 )
136
136
session2 = cluster2 .connect ()
137
137
(encrypted ,unencrypted ) = session2 .execute ("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering" , (expected ,)).one ()
138
- self .assertEquals (expected , encrypted )
139
- self .assertEquals (expected , unencrypted )
138
+ self .assertEqual (expected , encrypted )
139
+ self .assertEqual (expected , unencrypted )
140
140
141
141
def test_end_to_end_different_cle_contexts_different_policies (self ):
142
142
"""
@@ -161,10 +161,10 @@ def test_end_to_end_different_cle_contexts_different_policies(self):
161
161
# A straight select from the database will now return the decrypted bits. We select both encrypted and unencrypted
162
162
# values here to confirm that we don't interfere with regular processing of unencrypted vals.
163
163
(encrypted ,unencrypted ) = session2 .execute ("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering" , (expected ,)).one ()
164
- self .assertEquals (cl_policy .encode_and_encrypt (col_desc , expected ), encrypted )
165
- self .assertEquals (expected , unencrypted )
164
+ self .assertEqual (cl_policy .encode_and_encrypt (col_desc , expected ), encrypted )
165
+ self .assertEqual (expected , unencrypted )
166
166
167
167
# Confirm the same behaviour from a subsequent prepared statement as well
168
168
prepared = session2 .prepare ("select encrypted, unencrypted from foo.bar where unencrypted = ? allow filtering" )
169
169
(encrypted ,unencrypted ) = session2 .execute (prepared , [expected ]).one ()
170
- self .assertEquals (cl_policy .encode_and_encrypt (col_desc , expected ), encrypted )
170
+ self .assertEqual (cl_policy .encode_and_encrypt (col_desc , expected ), encrypted )
0 commit comments