commit 6f75509f9cd953fc1b29e8dd20fe3769c565ab70
Author: Nam Nguyen Hoai <email address hidden>
Date: Wed Jan 18 09:26:49 2017 +0700
Replace yaml.load() with yaml.safe_load()
Avoid dangerous file parsing and object serialization libraries.
yaml.load is the obvious function to use but it is dangerous[1]
Because yaml.load return Python object may be dangerous if you
receive a YAML document from an untrusted source such as the Internet.
The function yaml.safe_load limits this ability to simple Python
objects like integers or lists.
In addition, Bandit flags yaml.load() as security risk so replace
all occurrences with yaml.safe_load(). Thus I replace yaml.load()
with yaml.safe_load()
Reviewed: https:/ /review. openstack. org/421019 /git.openstack. org/cgit/ openstack/ monasca- notification/ commit/ ?id=6f75509f9cd 953fc1b29e8dd20 fe3769c565ab70
Committed: https:/
Submitter: Jenkins
Branch: master
commit 6f75509f9cd953f c1b29e8dd20fe37 69c565ab70
Author: Nam Nguyen Hoai <email address hidden>
Date: Wed Jan 18 09:26:49 2017 +0700
Replace yaml.load() with yaml.safe_load()
Avoid dangerous file parsing and object serialization libraries.
yaml.load is the obvious function to use but it is dangerous[1]
Because yaml.load return Python object may be dangerous if you
receive a YAML document from an untrusted source such as the Internet.
The function yaml.safe_load limits this ability to simple Python
objects like integers or lists.
In addition, Bandit flags yaml.load() as security risk so replace
all occurrences with yaml.safe_load(). Thus I replace yaml.load()
with yaml.safe_load()
[1] https:/ /security. openstack. org/guidelines/ dg_avoid- dangerous- input-parsing- libraries. html
Change-Id: I3f1a756e80b617 ba1bcf824ef4dee 9a27eb6887a
Closes-Bug: #1634265