Luong Anh Tuan ff8ae43265 Replace yaml.load() with yaml.safe_load()
Avoid dangerous file parsing and object serialization libraries.
yaml.load is the obvious function to use but it is dangerous[1]
Because yaml.load return Python object may be dangerous if you
receive a YAML document from an untrusted source such as the
Internet. The function yaml.safe_load limits this ability to
simple Python objects like integers or lists.

In addition, Bandit flags yaml.load() as security risk so replace
all occurrences with yaml.safe_load(). Thus I replace yaml.load()
with yaml.safe_load()

[1]https://security.openstack.org/guidelines/dg_avoid-dangerous-input-parsing-libraries.html

Change-Id: I84640973fd9f45a69d2b21f6d594cd5bf10660a6
Closes-Bug: #1634265
2017-01-16 15:07:05 +07:00
..
2016-12-20 11:46:22 +11:00
2015-02-12 10:41:32 +11:00
2016-11-18 10:48:05 +08:00
2016-04-15 12:37:22 +10:00
2016-07-08 09:15:08 -07:00
2015-12-10 20:12:14 +00:00
2015-02-12 10:41:32 +11:00
2016-05-13 11:52:23 +10:00
2016-05-09 15:41:38 +10:00
2015-06-26 09:57:12 +08:00
2016-06-08 21:16:50 +00:00
2016-03-20 10:42:34 -07:00
2016-05-09 15:41:38 +10:00
2016-05-09 15:41:38 +10:00
2015-02-12 10:41:32 +11:00
2016-12-22 14:26:35 +11:00
2016-06-07 01:00:50 +00:00
2016-10-20 15:19:31 +11:00