You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This commit was created on GitHub.com and signed with GitHub’s verified signature.
Added
Added a script for checking if the Civis API spec is up-to-date. (#489)
Added a new keyword argument sql_params_arguments to the civis.io.* functions that
accept a SQL query, so that the user can run a parameterized SQL script. (#493)
Changed
Refactored the civis.parallel module and related unit tests due to major changes
of joblib from v1.2.0 to v1.3.0 (API-breaking changes for dropping joblib.my_exceptions.TransportableException and joblib.format_stack.format_exc,
as well as the substantial changes to the internals of joblib.Parallel). (#488)
Bumped the minimum required version of joblib to v1.3.0,
which is the version where joblib.parallel_config was introduced and joblib.parallel_backend was deprecated. (#488)
Improved the startup time of import civis with a 5x speed boost. (#490, #493)
The downloaded API spec due to the civis.APIClient instantiation is now
a time-to-live cache in memory (15 minutes for interactive Python, or 24 hours in scripts). (#491)
Polling at PollableResult (and consequently its subclasses as well: CivisFuture, ContainerFuture, and ModelFuture) now defaults to geometrically increased polling
intervals. Short-running jobs' future.result() can now return faster, while
longer-running jobs have a capped polling interval of 15 seconds. (#492)
Comparing a Response object with a non-Response object returns False now
(this previously raised a TypeError). (#493)
Fixed
Fixed civis.parallel.make_backend_template_factory so that
keyword arguments are now accepted and passed to client.scripts.post_custom. (#488)
For Response objects, their "repr" form shows the class name "Response" for both
top-level and nested response objects. (#493)
Security
Bumped the minimum required version of requests to the latest v2.32.3,
due to a security vulnerability for < v2.32.0
(CVE-2024-35195). (#488)