-
Notifications
You must be signed in to change notification settings - Fork 635
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PyYAML 5.1 change breaking environment variables #1368
Comments
Signed-off-by: Knut Ahlers <[email protected]>
It should actually not be necessary to change to UnsafeLoader, and we will fix that in the next release. |
it also breaks int variables
|
I'm also experiencing this problem with int variables. |
I am also facing this issue with int variables. |
@untergeek I can see that the "issue" is fixed in master by locking the |
Sticking with |
Any plan to fix soon ? |
@piteur that implies you installed via |
thanks @untergeek , you save me from a bloody day. |
as a FYI pyyaml 3.12 will not build with python 3.7 when using the C extensions. Should I open an issue to pin curator to pyyaml-3.13 instead of 3.12? |
Sure. Thanks. The problem for me is that I can’t test Python 3.7 in Travis CI yet, as it isn’t available (or wasn’t last I checked). I was also unaware they released pyyaml 3.13 |
This should be addressed in #1596 as there were no necessary changes to the integration tests. |
Given this configuration file:
Expected Behavior
HOST
variable is read and inserted into configuration as it was beforeActual Behavior
YAML loader issues a warning and then curator tries to resolve
${HOST}
(literally) through DNSRelated: yaml/pyyaml#265 - PyYAML 5.1 changed the default loader from
Loader
(equalsUnsafeLoader
) toNone
which is evaluated asFullLoader
which then is not able to load env vars.Steps to Reproduce the Problem
Specifications
Possible fixes
Note: This fix does exactly the opposite of #1105 and would be a collision with that one.
Alternate (not recommended) way to work around: Pin PyYAML to 3.13 which is the latest stable version before 5.1 but also has a high severity CVE-2017-18342.
The text was updated successfully, but these errors were encountered: