Granted, Python and other popular languages are also on an ancient YAML version for some inexplicable reason...
If you configure your YAML loader to run arbitrary, input-controlled deserialization code, then of course you're opening a can of worms. Just, uh, don't do that for untrusted input maybe?
Is $programming_language terrible because some people run user input through eval?
The latest YAML (1.2 currently) gives you the option of doing all that stuff if you want. It's a bad implementation that decides to run random code by default, or heaven forbid, bakes such behavior in.
That's not meant as an endorsement, just saying it's not "making a comeback" any more than Taylor Swift is in music. It's The Thing right now and has been for a while.
Ansible is another tool for devops that uses YAML extensively; it shipped in 2012.
This says YAML support is behind an unstable flag, but I haven't been passing any flags. Works fine anyway.
No thanks. I'm done after Kaniko. https://github.com/GoogleContainerTools/kaniko
Blog post: https://www.chainguard.dev/unchained/fork-yeah-were-bringing...
The fork: https://github.com/chainguard-dev/kaniko
alwillis•7mo ago