Contributing¶
Any contribution to ruamel.yaml
is welcome, be it in the form of an
email, a question on stackoverflow (I\'ll get notified of that when you
tag it with ruamel.yaml
), an issue or pull-request (PR) on
sourceforge.
Contributing via stackoverflow is, for most, easy to do. When I answer
your question there and the answer warrants an extension to the
documentation or code, I will include it in a documentation update
and/or future (normally the next) release of ruamel.yaml
.
Please don\'t post support questions as an issue on sourceforge.
Documentation¶
The documentation for ruamel.yaml
is in YAML, more specifically in
ryd ( /rɑɪt/, pronounced like the
verb "write" ). This is Markdown (previously reStructuredText)
mixed with Python, each in
separate YAML documents within a single file. If you know a bit of YAML,
Python and Markdown, it will be clear how that works.
If you want to contribute to the documentation, you can send me a clear
description of the needed changes, e.g. as a unified diff. If the
changes encompass multiple documents in a .ryd
file, it is best to
install ryd
(use a virtualenv!), clone the ruamel.yaml
repository on
sourceforge, edit documentation, run ryd
:
ryd --pdf '**/*.ryd'
(quoting might not be necessary depending on your shell), and once the PDF(s) look acceptable, submit a pull-request.
ryd
will check your file for single backquotes (my most common mistake
going back and forth between reStructuredText and other mark up).
If you contribute example programs, note that ryd
will automatically
run your program (so it should be correct) and can include the output of
the program in the resulting .rst
(and PDF) file.
Code¶
Code changes are welcome as well, but anything beyond a minor change
should be tested (tox
/pytest
), checked for typing conformance
(mypy
) and pass pep8 conformance (flake8
).
In my experience it is best to use two virtualenv
environments, one
with the latest Python version currently supported, the other with
the oldest supported version.
In the site-packages directory of each virtualenv make a soft link to
the ruamel directory of your (cloned and checked out) copy of the
repository. Do not under any circumstances run pip install -e .
or
python setup.py -e .
it will not work (at least not until these
commands are fixed to support packages with namespaces).
You can install tox
, pytest
, mypy
and flake8
in the Python3
virtualenv
, or in a virtualenv
of their own. If all of these
commands pass without warning/error, you can create your pull-request.
Flake¶
My ~/.config/flake8
file:
[flake8]
show-source = True
max-line-length = 95
ignore = F405
The suppress of F405 is necessary to allow from xxx import *
, which I
have not removed in all places (yet).
First make sure your checked out source passes flake8
without test (it
should). Then make your changes pass without any warnings/errors.
Tox/pytest¶
Whether you add something or fix some bug with your code changes, first
add one or more tests that fail in the unmodified source when running
tox
. Once that is in place add your code, which should have as a
result that your added test(s) no longer fail, and neither should any
other existing tests.
Typing/mypy¶
If you add methods or functions to ruamel.yaml
, you will need to add
Python 2.7 compatible typing information in order for mypy
to pass
without error.
I run mypy
from the directory where the (link to) ruamel directory is
using:
mypy --py2 --strict --follow-imports silent ruamel/yaml/*.py
This should give no errors or warnings
Generated files¶
I use a minimal environment when developing, void of most artifacts
needed for packaging, testing etc. These artifact files are generated,
just before committing to sourceforge and pushing to PyPI, with nuances
coming from the _package_data
information in __init__.py
. Included
changes in these files will automatically be reverted, even assuming
your PR is accepted as is.
Consider the following files read-only (if you think changes need to be made to these, contact me):
setup.py
tox.ini
LICENSE
_ryd/conf.py
-ryd/Makefile
Vulnerabilities¶
If you find a vulnerability in ruamel.yaml
(e.g. that would show the
safe
and rt
loader are not safe due to a bug in the software)),
please contact me directly via email, or by leaving a comment on
StackOverflow (below any of my posts), without going into the details
about the vulnerability. After contact is estabilished I will work to
eliminate the vulnerability in a timely fashion. After the vulnerability
is removed, and affected parties haven been notified to allow them to
update versions, the vulnerability will be published, and your role in
finding/resolving this properly attributed.
Please note that there is a CVE out there against ruamel.yaml
, that states
that the input of the function load()
is not checked. As the
use of ruamel.yaml.load()
was never the default, was documented to potentially
cause problems when specific parameters were provided, and issued a
warning, this was always an inappropriate statement.
(To compare: no such CVE was given for the use of the Python standard library
function pickle.load
, which only documents which is default function
to use and only documented to potentially dangerious). The whole CVE is moot,
with the removal of the load()
function 0.18.