This pull request adds a new feature to the civis.io.* functions that call client.scripts.post_sql under the hood, for passing in SQL parameters and arguments. This new feature lets the user take advantage of Civis Platform's parameterized SQL scripts with functionality to mitigate security risks of SQL injections. See the linked internal ticket for testing this new feature.
Also going to make a new release of v2.3.0 after this pull request, so I'm bundling in here a few small fixes as well -- they're noted both in the changelog and comments on this PR.
[x] (For Civis employees only) Reference to a relevant ticket in the pull request title
[x] Changelog entry added to CHANGELOG.md at the repo's root level
[x] Description of change in the pull request description
[x] If applicable, unit tests have been added and/or updated
This pull request adds a new feature to the
civis.io.*
functions that callclient.scripts.post_sql
under the hood, for passing in SQL parameters and arguments. This new feature lets the user take advantage of Civis Platform's parameterized SQL scripts with functionality to mitigate security risks of SQL injections. See the linked internal ticket for testing this new feature.Also going to make a new release of v2.3.0 after this pull request, so I'm bundling in here a few small fixes as well -- they're noted both in the changelog and comments on this PR.
CHANGELOG.md
at the repo's root level