governance/doc/source/_exts
gengchc2 1d9b388bf1 Replaces yaml.load() with yaml.safe_load() for governance
Yaml.load() return Python object may be dangerous if you receive
a YAML document from an untrusted source such as the Internet.
The function yaml.safe_load() limits this ability to simple Python
objects like integers or lists.

Reference:
https://security.openstack.org/guidelines/dg_avoid-dangerous-input-parsing-libraries.html

Change-Id: Icf559f9c8b37c6f564c820fde79c85a77ba4f839
2017-03-10 01:05:29 +00:00
..
atcs.py Remove import unused 2016-11-17 09:59:25 +07:00
badges.py Update deep links 2016-12-21 11:31:24 +01:00
members.py Clean imports in code 2016-09-09 16:00:29 +07:00
projects.py Replaces yaml.load() with yaml.safe_load() for governance 2017-03-10 01:05:29 +00:00
tags.py Clean imports in code 2016-09-09 16:00:29 +07:00
teams.py escape the PTL IRC nick to avoid rst rendering issues 2016-12-13 14:37:53 -05:00