d08b4ce374
Some of the lookup plugins access files on the executor host. Obviously that's not what we want, so block them like we block action plugins. password.py is banned, although it could be filtered. However, the upstream code is fairly intense and slated for refactoring - so let's wait until someone gets upset about it. Change-Id: I6260b4658619a972b588c8bfba40ec33557bf2f6
32 lines
1.1 KiB
Python
32 lines
1.1 KiB
Python
# Copyright 2017 Red Hat, Inc.
|
|
#
|
|
# This module is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This software is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this software. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
from zuul.ansible import paths
|
|
ini = paths._import_ansible_lookup_plugin("ini")
|
|
|
|
|
|
class LookupModule(ini.LookupModule):
|
|
|
|
def read_properties(self, filename, *args, **kwargs):
|
|
paths._fail_if_unsafe(filename)
|
|
return super(LookupModule, self).read_properties(
|
|
filename, *args, **kwargs)
|
|
|
|
def read_ini(self, filename, *args, **kwargs):
|
|
paths._fail_if_unsafe(filename)
|
|
return super(LookupModule, self).read_ini(
|
|
filename, *args, **kwargs)
|