Skip to content

Commit 611431c

Browse files
authored
PYTHON-1389 Removing deprecated test aliases (#1216)
1 parent b347653 commit 611431c

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

tests/integration/standard/column_encryption/test_policies.py

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -58,14 +58,14 @@ def test_end_to_end_prepared(self):
5858
# A straight select from the database will now return the decrypted bits. We select both encrypted and unencrypted
5959
# values here to confirm that we don't interfere with regular processing of unencrypted vals.
6060
(encrypted,unencrypted) = session.execute("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering", (expected,)).one()
61-
self.assertEquals(expected, encrypted)
62-
self.assertEquals(expected, unencrypted)
61+
self.assertEqual(expected, encrypted)
62+
self.assertEqual(expected, unencrypted)
6363

6464
# Confirm the same behaviour from a subsequent prepared statement as well
6565
prepared = session.prepare("select encrypted, unencrypted from foo.bar where unencrypted = ? allow filtering")
6666
(encrypted,unencrypted) = session.execute(prepared, [expected]).one()
67-
self.assertEquals(expected, encrypted)
68-
self.assertEquals(expected, unencrypted)
67+
self.assertEqual(expected, encrypted)
68+
self.assertEqual(expected, unencrypted)
6969

7070
def test_end_to_end_simple(self):
7171

@@ -86,14 +86,14 @@ def test_end_to_end_simple(self):
8686
# A straight select from the database will now return the decrypted bits. We select both encrypted and unencrypted
8787
# values here to confirm that we don't interfere with regular processing of unencrypted vals.
8888
(encrypted,unencrypted) = session.execute("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering", (expected,)).one()
89-
self.assertEquals(expected, encrypted)
90-
self.assertEquals(expected, unencrypted)
89+
self.assertEqual(expected, encrypted)
90+
self.assertEqual(expected, unencrypted)
9191

9292
# Confirm the same behaviour from a subsequent prepared statement as well
9393
prepared = session.prepare("select encrypted, unencrypted from foo.bar where unencrypted = ? allow filtering")
9494
(encrypted,unencrypted) = session.execute(prepared, [expected]).one()
95-
self.assertEquals(expected, encrypted)
96-
self.assertEquals(expected, unencrypted)
95+
self.assertEqual(expected, encrypted)
96+
self.assertEqual(expected, unencrypted)
9797

9898
def test_end_to_end_different_cle_contexts_different_ivs(self):
9999
"""
@@ -135,8 +135,8 @@ def test_end_to_end_different_cle_contexts_different_ivs(self):
135135
cluster2 = TestCluster(column_encryption_policy=cl_policy2)
136136
session2 = cluster2.connect()
137137
(encrypted,unencrypted) = session2.execute("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering", (expected,)).one()
138-
self.assertEquals(expected, encrypted)
139-
self.assertEquals(expected, unencrypted)
138+
self.assertEqual(expected, encrypted)
139+
self.assertEqual(expected, unencrypted)
140140

141141
def test_end_to_end_different_cle_contexts_different_policies(self):
142142
"""
@@ -161,10 +161,10 @@ def test_end_to_end_different_cle_contexts_different_policies(self):
161161
# A straight select from the database will now return the decrypted bits. We select both encrypted and unencrypted
162162
# values here to confirm that we don't interfere with regular processing of unencrypted vals.
163163
(encrypted,unencrypted) = session2.execute("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering", (expected,)).one()
164-
self.assertEquals(cl_policy.encode_and_encrypt(col_desc, expected), encrypted)
165-
self.assertEquals(expected, unencrypted)
164+
self.assertEqual(cl_policy.encode_and_encrypt(col_desc, expected), encrypted)
165+
self.assertEqual(expected, unencrypted)
166166

167167
# Confirm the same behaviour from a subsequent prepared statement as well
168168
prepared = session2.prepare("select encrypted, unencrypted from foo.bar where unencrypted = ? allow filtering")
169169
(encrypted,unencrypted) = session2.execute(prepared, [expected]).one()
170-
self.assertEquals(cl_policy.encode_and_encrypt(col_desc, expected), encrypted)
170+
self.assertEqual(cl_policy.encode_and_encrypt(col_desc, expected), encrypted)

0 commit comments

Comments
 (0)