gengchc2 1d9b388bf1 Replaces yaml.load() with yaml.safe_load() for governance
Yaml.load() return Python object may be dangerous if you receive
a YAML document from an untrusted source such as the Internet.
The function yaml.safe_load() limits this ability to simple Python
objects like integers or lists.

Reference:
https://security.openstack.org/guidelines/dg_avoid-dangerous-input-parsing-libraries.html

Change-Id: Icf559f9c8b37c6f564c820fde79c85a77ba4f839
2017-03-10 01:05:29 +00:00

42 lines
1.1 KiB
Python

# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
"""Load the projects.yaml file.
"""
import copy
import os.path
import yaml
_projects_yaml = {}
def get_project_data():
"""Return a copy of the project data."""
return copy.deepcopy(_projects_yaml)
def slugify(name):
"""Convert name to slug form for references."""
return name.lower().replace(' ', '-')
def setup(app):
global _projects_yaml
filename = os.path.abspath('reference/projects.yaml')
app.info('reading %s' % filename)
with open(filename, 'r') as f:
_projects_yaml = yaml.safe_load(f.read().decode('utf-8'))