Yaml.load() return Python object may be dangerous if you receive a YAML
document from an untrusted source such as the Internet. The function
yaml.safe_load() limits this ability to simple Python objects like integers or
lists.
While we're there switch to https for the load so we can be more
confident this is 'correct' data
Reference:
https://security.openstack.org/guidelines/dg_avoid-dangerous-input-parsing-libraries.html
Change-Id: I89adc358f1b3e934788a416b7ef7ea8bfc1a45db
The current script is broken due to format changes in projects.yaml from
governance project. We are now explicitly specifying the IRC and email
for each name. This patch fixes it.
Change-Id: I5f7f0d94f91923710b569a344c77bf47006aa99e
The cross-project meeting starts with a courtesy ping for each PTL. Now
that we are adding more projects, it is useful to have a tool to build
the list instead of keeping a static copy somewhere.
Change-Id: If23bf302e912557fbb44b5e68747956308bccf64