Yaml.load() return Python object may be dangerous if you receive
a YAML document from an untrusted source such as the Internet.
The function yaml.safe_load() limits this ability to simple Python
objects like integers or lists.
Reference:
https://security.openstack.org/guidelines/dg_avoid-dangerous-input-parsing-libraries.html
Change-Id: I78fde872948d6838957e35765c3f182bd4b9b512
Adding a tool for generating requirements.yml
files for each Openstack-Ansible role. This
tool is intended to be used by maintainers of
OpenStack-Ansible. The goal of the generated
requirements.yml files to allow end users the
ability to consume roles without needing to
use all of OpenStack-Ansible.
Change-Id: I8f4c0bf3ea4366bd84b671f796cedc07e5d4db80