@@ -58,14 +58,14 @@ def test_end_to_end_prepared(self):
5858 # A straight select from the database will now return the decrypted bits. We select both encrypted and unencrypted
5959 # values here to confirm that we don't interfere with regular processing of unencrypted vals.
6060 (encrypted ,unencrypted ) = session .execute ("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering" , (expected ,)).one ()
61- self .assertEquals (expected , encrypted )
62- self .assertEquals (expected , unencrypted )
61+ self .assertEqual (expected , encrypted )
62+ self .assertEqual (expected , unencrypted )
6363
6464 # Confirm the same behaviour from a subsequent prepared statement as well
6565 prepared = session .prepare ("select encrypted, unencrypted from foo.bar where unencrypted = ? allow filtering" )
6666 (encrypted ,unencrypted ) = session .execute (prepared , [expected ]).one ()
67- self .assertEquals (expected , encrypted )
68- self .assertEquals (expected , unencrypted )
67+ self .assertEqual (expected , encrypted )
68+ self .assertEqual (expected , unencrypted )
6969
7070 def test_end_to_end_simple (self ):
7171
@@ -86,14 +86,14 @@ def test_end_to_end_simple(self):
8686 # A straight select from the database will now return the decrypted bits. We select both encrypted and unencrypted
8787 # values here to confirm that we don't interfere with regular processing of unencrypted vals.
8888 (encrypted ,unencrypted ) = session .execute ("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering" , (expected ,)).one ()
89- self .assertEquals (expected , encrypted )
90- self .assertEquals (expected , unencrypted )
89+ self .assertEqual (expected , encrypted )
90+ self .assertEqual (expected , unencrypted )
9191
9292 # Confirm the same behaviour from a subsequent prepared statement as well
9393 prepared = session .prepare ("select encrypted, unencrypted from foo.bar where unencrypted = ? allow filtering" )
9494 (encrypted ,unencrypted ) = session .execute (prepared , [expected ]).one ()
95- self .assertEquals (expected , encrypted )
96- self .assertEquals (expected , unencrypted )
95+ self .assertEqual (expected , encrypted )
96+ self .assertEqual (expected , unencrypted )
9797
9898 def test_end_to_end_different_cle_contexts_different_ivs (self ):
9999 """
@@ -135,8 +135,8 @@ def test_end_to_end_different_cle_contexts_different_ivs(self):
135135 cluster2 = TestCluster (column_encryption_policy = cl_policy2 )
136136 session2 = cluster2 .connect ()
137137 (encrypted ,unencrypted ) = session2 .execute ("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering" , (expected ,)).one ()
138- self .assertEquals (expected , encrypted )
139- self .assertEquals (expected , unencrypted )
138+ self .assertEqual (expected , encrypted )
139+ self .assertEqual (expected , unencrypted )
140140
141141 def test_end_to_end_different_cle_contexts_different_policies (self ):
142142 """
@@ -161,10 +161,10 @@ def test_end_to_end_different_cle_contexts_different_policies(self):
161161 # A straight select from the database will now return the decrypted bits. We select both encrypted and unencrypted
162162 # values here to confirm that we don't interfere with regular processing of unencrypted vals.
163163 (encrypted ,unencrypted ) = session2 .execute ("select encrypted, unencrypted from foo.bar where unencrypted = %s allow filtering" , (expected ,)).one ()
164- self .assertEquals (cl_policy .encode_and_encrypt (col_desc , expected ), encrypted )
165- self .assertEquals (expected , unencrypted )
164+ self .assertEqual (cl_policy .encode_and_encrypt (col_desc , expected ), encrypted )
165+ self .assertEqual (expected , unencrypted )
166166
167167 # Confirm the same behaviour from a subsequent prepared statement as well
168168 prepared = session2 .prepare ("select encrypted, unencrypted from foo.bar where unencrypted = ? allow filtering" )
169169 (encrypted ,unencrypted ) = session2 .execute (prepared , [expected ]).one ()
170- self .assertEquals (cl_policy .encode_and_encrypt (col_desc , expected ), encrypted )
170+ self .assertEqual (cl_policy .encode_and_encrypt (col_desc , expected ), encrypted )
0 commit comments