• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

RH-FMK / skt / 1257 / 1
66%
master: 66%

Build:
DEFAULT BRANCH: master
Ran 05 Sep 2018 07:59AM UTC
Files 10
Run time 1s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

05 Sep 2018 07:57AM UTC coverage: 66.531% (+0.02%) from 66.514%
TOX_ENV=py27,flake8,pylint

push

travis-ci

spbnick
Use defusedxml for XML parsing

In theory, a user can pass a maliciously crafted XML, exploiting the
server/testing side. While currently it means they would exploit their
own infrastructure, if in the future there is a publicly available
service allowing people to run eg. custom tests or pass their own
Beaker XMLs, the possibility to expoit the organization running the
service grows exponentially.

xml.ElementTree is safe against external entity expansion, DTD retrieval
and decompression bomb, but not against exponential entity expansion or
quadratic blowup entity expansion. defusedxml provides a modified
fromstring method for parsing untrusted XMLs, to prevent the exploits
original ElementTree is not protected against.

Signed-off-by: Veronika Kabatova <vkabatov@redhat.com>

309 of 525 branches covered (58.86%)

Branch coverage included in aggregate %.

997 of 1438 relevant lines covered (69.33%)

0.69 hits per line

Source Files on job 1257.1 (TOX_ENV=py27,flake8,pylint)
  • Tree
  • List 0
  • Changed 1
  • Source Changed 1
  • Coverage Changed 1
Coverage ∆ File Lines Relevant Covered Missed Hits/Line Branch Hits Branch Misses
  • Back to Build 669
  • Travis Job 1257.1
  • 64cac508 on github
  • Prev Job for TOX_ENV=py27,flake8,pylint on master (#1252.1)
  • Next Job for TOX_ENV=py27,flake8,pylint on master (#1260.1)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc