Octue

Latest version: v0.61.0

Safety actively analyzes 688823 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 35 of 40

0.2.3

Not secure
Contents

Enhancements
- [x] Improve `Service` log messages
- [x] Keep full module path in logging context when using analysis logger
- [x] Demote storage client log messages to `DEBUG` level

Fixes
- [x] Fix and improve `apply_log_handler` function
- [x] Apply log handler to the root logger in top-level `__init__` module
- [x] Stop duplication of timestamp in Google Cloud Run logs by applying different handler/formatter if `PLATFORM` environment variable is present and equal to `GOOGLE_CLOUD_RUN`
- [x] Add `COMPUTE_PLATFORM=GOOGLE_CLOUD_RUN` environment variable to docker image
- [x] Remove applying of log handler from incorrect places
- [x] Remove extra logger in `runner` module
- [x] Stop analysis logger propagating to the root logger and repeating log messages

Reversions
- [x] Remove `show-twined-logs` option from CLI

Testing
- [x] Silence GCP Storage emulator logs below `ERROR` level
- [x] Ensure unmocked `Subscription` test always deletes topic and subscription
- [x] Remove extra logger from `tests.base`
- [x] Avoid irrelevant exception in Cloud Run tests

Operations
- [x] Remove unnecessary preceding underscores from ARGs in Dockerfile

0.2.2

Not secure
Summary
Use service question UUIDs as analysis IDs to allow log messages for a Google Cloud Run service to be filtered for a given question. Also improve the presentation of error messages forwarded from the responding service to the asking service.

Contents

Enhancements
- [x] Use service question UUIDs as analysis IDs
- [x] Dynamically create exception class in `Service._raise_exception_from_responder` if the received type name is unknown to the asker

Minor improvements
- [x] Use a string UUID for question IDs rather than an integer UUID

<!--- START AUTOGENERATED NOTES --->
<!--- END AUTOGENERATED NOTES --->

0.2.1

Not secure
Contents

Fixes
- [x] Allow non-JSON-encoded items in GCS metadata (this means a `Datafile` can be instantiated from any GCS object with arbitrary metadata rather than raising an error)

<!--- START AUTOGENERATED NOTES --->
<!--- END AUTOGENERATED NOTES --->

0.2.0

Not secure
Contents

Breaking changes
- [x] Remove the `sequence` and `cluster` attributes from `Datafile` (they were simply tags with unnecessary special treatment)

Refactoring
- [x] Replace `Dataset.get_file_sequence` with added functionality in `FilterContainer.order_by`

Operations
- [x] Ensure breaking change commits increment minor version number in `mkver.conf`

<!--- START AUTOGENERATED NOTES --->
<!--- END AUTOGENERATED NOTES --->

0.1.27

Not secure
Contents

Enhancements
- [x] Log purely service-caused exceptions in Google Cloud Run without raising them, always returning a `204` response unless there is an error in Google Cloud Run itself
- [x] Forward service-caused exceptions back to local asker and raise them there, separating the local traceback from the remote traceback

Refactoring
- [x] Use built-in `datetime` POSIX time methods instead of custom-written functions

Testing
- [x] Test Cloud Run `answer_question` function locally (it's already tested remotely in the deployment tests but this doesn't show up in the test coverage)

<!--- START AUTOGENERATED NOTES --->
<!--- END AUTOGENERATED NOTES --->

0.1.26

Not secure
Contents

Refactoring/fixes
- [x] Combine `Datafile.__init__` with `Datafile.from_cloud` for simpler and more robust interface
- [x] Carry out functionality of former `Datafile.from_cloud` method in `Datafile.__init__` if the `path` parameter is a cloud path

Reversions
- [x] Remove ability to override cloud metadata on locally instantiated `Datafile` during instantiation

<!--- START AUTOGENERATED NOTES --->
<!--- END AUTOGENERATED NOTES --->

Page 35 of 40

Links

Releases

Has known vulnerabilities

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.