all:
  children:
    cephs:
      hosts:
        instance: null
    computes:
      hosts:
        instance: null
    controllers:
      hosts:
        instance: null
    zuul_unreachable:
      hosts: {}
  hosts:
    instance:
      ansible_connection: ssh
      ansible_host: 162.253.55.62
      ansible_port: 22
      ansible_python_interpreter: auto
      ansible_user: zuul
      atmosphere_image_prefix: harbor.atmosphere.dev/
      atmosphere_network_backend: ovn
      barbican_helm_values:
        pod:
          replicas:
            api: 1
      ceph_conf_overrides:
      - option: mon allow pool size one
        section: global
        value: true
      - option: osd crush chooseleaf type
        section: global
        value: 0
      - option: auth allow insecure global id reclaim
        section: mon
        value: false
      ceph_csi_rbd_helm_values:
        provisioner:
          replicaCount: 1
      ceph_fsid: 4837cbf8-4f90-4300-b3f6-726c9b9f89b4
      ceph_osd_devices:
      - /dev/ceph-{{ inventory_hostname_short }}-osd0/data
      - /dev/ceph-{{ inventory_hostname_short }}-osd1/data
      - /dev/ceph-{{ inventory_hostname_short }}-osd2/data
      ceph_version: 18.2.7
      cilium_helm_values:
        operator:
          replicas: 1
      cinder_helm_values:
        conf:
          ceph:
            pools:
              backup:
                replication: 1
              cinder.volumes:
                replication: 1
          cinder:
            DEFAULT:
              osapi_volume_workers: 2
        pod:
          replicas:
            api: 1
            scheduler: 1
      cluster_issuer_type: self-signed
      coredns_helm_values:
        replicaCount: 1
      csi_driver: local-path-provisioner
      glance_helm_values:
        conf:
          glance:
            DEFAULT:
              workers: 2
            glance_store:
              rbd_store_replication: 1
        pod:
          replicas:
            api: 1
      glance_images:
      - container_format: bare
        disk_format: raw
        is_public: true
        min_disk: 1
        name: cirros
        url: http://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img
      heat_helm_values:
        conf:
          heat:
            DEFAULT:
              num_engine_workers: 2
            heat_api:
              workers: 2
            heat_api_cfn:
              workers: 2
            heat_api_cloudwatch:
              workers: 2
        pod:
          replicas:
            api: 1
            cfn: 1
            cloudwatch: 1
            engine: 1
      horizon_helm_values:
        pod:
          replicas:
            server: 1
      ingress_nginx_helm_values:
        controller:
          config:
            worker-processes: 2
      keystone_helm_values:
        pod:
          replicas:
            api: 1
      kube_vip_address: 172.17.0.100
      kube_vip_interface: '{{ ansible_facts[''default_ipv4''].interface }}'
      kubernetes_hostname: '{{ ansible_facts[''default_ipv4''].address }}'
      kubernetes_keepalived_interface: br-mgmt
      magnum_helm_values:
        conf:
          magnum:
            api:
              workers: 2
            conductor:
              workers: 2
        pod:
          replicas:
            api: 1
            conductor: 1
      magnum_image_disk_format: qcow2
      magnum_images: '[ {{ _magnum_images[-1] }} ]'
      manila_helm_values:
        conf:
          manila:
            DEFAULT:
              osapi_share_workers: 2
        pod:
          replicas:
            api: 1
            scheduler: 1
      molecule_scenario: aio
      neutron_helm_values:
        conf:
          neutron:
            DEFAULT:
              api_workers: 2
              metadata_workers: 2
              rpc_workers: 2
        pod:
          replicas:
            rpc_server: 1
            server: 1
      nodepool:
        az: nova
        cloud: public
        external_id: 784cc906-e7d5-45ee-8abf-eeab57c0a13f
        host_id: 46a3119b92b21b95fc3b5fbffd17c6ebf9fffaf9848b0a50b2d8d56a
        interface_ip: 162.253.55.62
        label: ubuntu-jammy-16
        node_properties: {}
        private_ipv4: 162.253.55.62
        private_ipv6: null
        provider: yul1
        public_ipv4: 162.253.55.62
        public_ipv6: 2604:e100:1:0:f816:3eff:feb4:f005
        region: ca-ymq-1
        slot: null
      nova_helm_values:
        conf:
          nova:
            DEFAULT:
              metadata_workers: 2
              osapi_compute_workers: 2
            conductor:
              workers: 2
            scheduler:
              workers: 2
        pod:
          replicas:
            api_metadata: 1
            conductor: 1
            novncproxy: 1
            osapi: 1
            scheduler: 1
            spiceproxy: 1
      octavia_helm_values:
        conf:
          octavia:
            controller_worker:
              workers: 2
          octavia_api_uwsgi:
            uwsgi:
              processes: 2
        pod:
          replicas:
            api: 1
            housekeeping: 1
            worker: 1
      ovn_helm_values:
        conf:
          auto_bridge_add:
            br-ex: null
        pod:
          replicas:
            ovn_northd: 1
            ovn_ovsdb_nb: 1
            ovn_ovsdb_sb: 1
      percona_xtradb_cluster_spec:
        allowUnsafeConfigurations: true
        haproxy:
          size: 1
        pxc:
          size: 1
      placement_helm_values:
        conf:
          placement_api_uwsgi:
            uwsgi:
              processes: 2
        pod:
          replicas:
            api: 1
      rook_ceph_cluster_radosgw_spec:
        dataPool:
          failureDomain: osd
        gateway:
          instances: 1
        metadataPool:
          failureDomain: osd
      staffeln_helm_values:
        pod:
          replicas:
            api: 1
            conductor: 1
      valkey_helm_values:
        replica:
          replicaCount: 1
      zuul_node:
        az: nova
        cloud: public
        external_id: 784cc906-e7d5-45ee-8abf-eeab57c0a13f
        host_id: 46a3119b92b21b95fc3b5fbffd17c6ebf9fffaf9848b0a50b2d8d56a
        interface_ip: 162.253.55.62
        label: ubuntu-jammy-16
        node_properties: {}
        private_ipv4: 162.253.55.62
        private_ipv6: null
        provider: yul1
        public_ipv4: 162.253.55.62
        public_ipv6: 2604:e100:1:0:f816:3eff:feb4:f005
        region: ca-ymq-1
        slot: null
        uuid: null
  vars:
    atmosphere_image_prefix: harbor.atmosphere.dev/
    atmosphere_network_backend: ovn
    barbican_helm_values:
      pod:
        replicas:
          api: 1
    ceph_conf_overrides:
    - option: mon allow pool size one
      section: global
      value: true
    - option: osd crush chooseleaf type
      section: global
      value: 0
    - option: auth allow insecure global id reclaim
      section: mon
      value: false
    ceph_csi_rbd_helm_values:
      provisioner:
        replicaCount: 1
    ceph_fsid: 4837cbf8-4f90-4300-b3f6-726c9b9f89b4
    ceph_osd_devices:
    - /dev/ceph-{{ inventory_hostname_short }}-osd0/data
    - /dev/ceph-{{ inventory_hostname_short }}-osd1/data
    - /dev/ceph-{{ inventory_hostname_short }}-osd2/data
    ceph_version: 18.2.7
    cilium_helm_values:
      operator:
        replicas: 1
    cinder_helm_values:
      conf:
        ceph:
          pools:
            backup:
              replication: 1
            cinder.volumes:
              replication: 1
        cinder:
          DEFAULT:
            osapi_volume_workers: 2
      pod:
        replicas:
          api: 1
          scheduler: 1
    cluster_issuer_type: self-signed
    coredns_helm_values:
      replicaCount: 1
    csi_driver: local-path-provisioner
    glance_helm_values:
      conf:
        glance:
          DEFAULT:
            workers: 2
          glance_store:
            rbd_store_replication: 1
      pod:
        replicas:
          api: 1
    glance_images:
    - container_format: bare
      disk_format: raw
      is_public: true
      min_disk: 1
      name: cirros
      url: http://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img
    heat_helm_values:
      conf:
        heat:
          DEFAULT:
            num_engine_workers: 2
          heat_api:
            workers: 2
          heat_api_cfn:
            workers: 2
          heat_api_cloudwatch:
            workers: 2
      pod:
        replicas:
          api: 1
          cfn: 1
          cloudwatch: 1
          engine: 1
    horizon_helm_values:
      pod:
        replicas:
          server: 1
    ingress_nginx_helm_values:
      controller:
        config:
          worker-processes: 2
    keystone_helm_values:
      pod:
        replicas:
          api: 1
    kube_vip_address: 172.17.0.100
    kube_vip_interface: '{{ ansible_facts[''default_ipv4''].interface }}'
    kubernetes_hostname: '{{ ansible_facts[''default_ipv4''].address }}'
    kubernetes_keepalived_interface: br-mgmt
    magnum_helm_values:
      conf:
        magnum:
          api:
            workers: 2
          conductor:
            workers: 2
      pod:
        replicas:
          api: 1
          conductor: 1
    magnum_image_disk_format: qcow2
    magnum_images: '[ {{ _magnum_images[-1] }} ]'
    manila_helm_values:
      conf:
        manila:
          DEFAULT:
            osapi_share_workers: 2
      pod:
        replicas:
          api: 1
          scheduler: 1
    molecule_scenario: aio
    neutron_helm_values:
      conf:
        neutron:
          DEFAULT:
            api_workers: 2
            metadata_workers: 2
            rpc_workers: 2
      pod:
        replicas:
          rpc_server: 1
          server: 1
    nova_helm_values:
      conf:
        nova:
          DEFAULT:
            metadata_workers: 2
            osapi_compute_workers: 2
          conductor:
            workers: 2
          scheduler:
            workers: 2
      pod:
        replicas:
          api_metadata: 1
          conductor: 1
          novncproxy: 1
          osapi: 1
          scheduler: 1
          spiceproxy: 1
    octavia_helm_values:
      conf:
        octavia:
          controller_worker:
            workers: 2
        octavia_api_uwsgi:
          uwsgi:
            processes: 2
      pod:
        replicas:
          api: 1
          housekeeping: 1
          worker: 1
    ovn_helm_values:
      conf:
        auto_bridge_add:
          br-ex: null
      pod:
        replicas:
          ovn_northd: 1
          ovn_ovsdb_nb: 1
          ovn_ovsdb_sb: 1
    percona_xtradb_cluster_spec:
      allowUnsafeConfigurations: true
      haproxy:
        size: 1
      pxc:
        size: 1
    placement_helm_values:
      conf:
        placement_api_uwsgi:
          uwsgi:
            processes: 2
      pod:
        replicas:
          api: 1
    rook_ceph_cluster_radosgw_spec:
      dataPool:
        failureDomain: osd
      gateway:
        instances: 1
      metadataPool:
        failureDomain: osd
    staffeln_helm_values:
      pod:
        replicas:
          api: 1
          conductor: 1
    valkey_helm_values:
      replica:
        replicaCount: 1
    zuul:
      _inheritance_path:
      - '<Job base explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/zuul-config/zuul.d/jobs.yaml@main#1>'
      - '<Job molecule explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/zuul-jobs/zuul.d/ansible-jobs.yaml@main#1>'
      - '<Job atmosphere-molecule explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/atmosphere/.zuul.yaml@main#24>'
      - '<Job atmosphere-molecule-aio explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/atmosphere/.zuul.yaml@main#79>'
      - '<Job atmosphere-molecule-aio-ovn explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/atmosphere/.zuul.yaml@main#267>'
      - '<Job atmosphere-molecule-aio-ovn explicit: None implied: None source: vexxhost/atmosphere/.zuul.yaml@main#273>'
      ansible_version: '9'
      attempts: 1
      branch: main
      build: 39074fcc0fd3414facda2fadc94b6e0c
      build_refs:
      - branch: main
        change: '3725'
        change_message: '[StepSecurity] Apply security best practices


          ## Summary


          This pull request has been generated by [StepSecurity](https://app.stepsecurity.io/github/vexxhost/actions/dashboard)
          as part of your enterprise subscription to ensure compliance with recommended
          security best practices. Please review and merge the pull request to apply
          these security enhancements.


          ## Security Fixes


          ### Harden Runner


          Harden-Runner is an open-source security agent for the GitHub-hosted runner
          to prevent software supply chain attacks. It prevents exfiltration of credentials,
          detects tampering of source code during build, and enables running jobs
          without sudo access.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#dangerous-workflow)

          ### Least Privileged GitHub Actions Token Permissions


          The GITHUB_TOKEN is an automatically generated secret to make authenticated
          calls to the GitHub API. GitHub recommends setting minimum token permissions
          for the GITHUB_TOKEN.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#using-the-github_token-in-a-workflow)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions)


          ### Pinned Dependencies


          Pinning GitHub Actions to specific versions or commit SHAs ensures that
          your workflows remain consistent and secure.

          Unpinned actions can lead to unexpected changes or vulnerabilities caused
          by upstream updates.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)

          ### StepSecurity Maintained Actions


          Risky GitHub Actions can expose your project to potential security risks.
          Risky actions have been replaced with StepSecurity maintained actions, that
          are secure drop-in replacements.


          - [StepSecurity Maintained Actions](https://docs.stepsecurity.io/actions/stepsecurity-maintained-actions)

          ### Secure Dockerfiles


          Pin image tags to digests in Dockerfiles. With the Docker v2 API release,
          it became possible to use digests in place of tags when pulling images or
          to use them in FROM lines in Dockerfiles.


          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)



          ## Feedback

          For bug reports, feature requests, and general feedback; please create an
          issue in [step-security/secure-repo](https://github.com/step-security/secure-repo)
          or contact us via [our website](https://www.stepsecurity.io/).



          '
        change_url: https://github.com/vexxhost/atmosphere/pull/3725
        commit_id: b56070d9c83eeec0d7c345af25edfe38f4706f19
        patchset: b56070d9c83eeec0d7c345af25edfe38f4706f19
        project:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/atmosphere
          name: vexxhost/atmosphere
          short_name: atmosphere
          src_dir: src/github.com/vexxhost/atmosphere
        src_dir: src/github.com/vexxhost/atmosphere
        topic: null
      buildset: fafad356e40a43f4845427cb1be9f32f
      buildset_refs:
      - branch: main
        change: '3725'
        change_message: '[StepSecurity] Apply security best practices


          ## Summary


          This pull request has been generated by [StepSecurity](https://app.stepsecurity.io/github/vexxhost/actions/dashboard)
          as part of your enterprise subscription to ensure compliance with recommended
          security best practices. Please review and merge the pull request to apply
          these security enhancements.


          ## Security Fixes


          ### Harden Runner


          Harden-Runner is an open-source security agent for the GitHub-hosted runner
          to prevent software supply chain attacks. It prevents exfiltration of credentials,
          detects tampering of source code during build, and enables running jobs
          without sudo access.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#dangerous-workflow)

          ### Least Privileged GitHub Actions Token Permissions


          The GITHUB_TOKEN is an automatically generated secret to make authenticated
          calls to the GitHub API. GitHub recommends setting minimum token permissions
          for the GITHUB_TOKEN.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#using-the-github_token-in-a-workflow)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions)


          ### Pinned Dependencies


          Pinning GitHub Actions to specific versions or commit SHAs ensures that
          your workflows remain consistent and secure.

          Unpinned actions can lead to unexpected changes or vulnerabilities caused
          by upstream updates.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)

          ### StepSecurity Maintained Actions


          Risky GitHub Actions can expose your project to potential security risks.
          Risky actions have been replaced with StepSecurity maintained actions, that
          are secure drop-in replacements.


          - [StepSecurity Maintained Actions](https://docs.stepsecurity.io/actions/stepsecurity-maintained-actions)

          ### Secure Dockerfiles


          Pin image tags to digests in Dockerfiles. With the Docker v2 API release,
          it became possible to use digests in place of tags when pulling images or
          to use them in FROM lines in Dockerfiles.


          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)



          ## Feedback

          For bug reports, feature requests, and general feedback; please create an
          issue in [step-security/secure-repo](https://github.com/step-security/secure-repo)
          or contact us via [our website](https://www.stepsecurity.io/).



          '
        change_url: https://github.com/vexxhost/atmosphere/pull/3725
        commit_id: b56070d9c83eeec0d7c345af25edfe38f4706f19
        patchset: b56070d9c83eeec0d7c345af25edfe38f4706f19
        project:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/atmosphere
          name: vexxhost/atmosphere
          short_name: atmosphere
          src_dir: src/github.com/vexxhost/atmosphere
        src_dir: src/github.com/vexxhost/atmosphere
        topic: null
      change: '3725'
      change_message: '[StepSecurity] Apply security best practices


        ## Summary


        This pull request has been generated by [StepSecurity](https://app.stepsecurity.io/github/vexxhost/actions/dashboard)
        as part of your enterprise subscription to ensure compliance with recommended
        security best practices. Please review and merge the pull request to apply
        these security enhancements.


        ## Security Fixes


        ### Harden Runner


        Harden-Runner is an open-source security agent for the GitHub-hosted runner
        to prevent software supply chain attacks. It prevents exfiltration of credentials,
        detects tampering of source code during build, and enables running jobs without
        sudo access.


        - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions)

        - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#dangerous-workflow)

        ### Least Privileged GitHub Actions Token Permissions


        The GITHUB_TOKEN is an automatically generated secret to make authenticated
        calls to the GitHub API. GitHub recommends setting minimum token permissions
        for the GITHUB_TOKEN.


        - [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#using-the-github_token-in-a-workflow)

        - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions)


        ### Pinned Dependencies


        Pinning GitHub Actions to specific versions or commit SHAs ensures that your
        workflows remain consistent and secure.

        Unpinned actions can lead to unexpected changes or vulnerabilities caused
        by upstream updates.


        - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)

        - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)

        ### StepSecurity Maintained Actions


        Risky GitHub Actions can expose your project to potential security risks.
        Risky actions have been replaced with StepSecurity maintained actions, that
        are secure drop-in replacements.


        - [StepSecurity Maintained Actions](https://docs.stepsecurity.io/actions/stepsecurity-maintained-actions)

        ### Secure Dockerfiles


        Pin image tags to digests in Dockerfiles. With the Docker v2 API release,
        it became possible to use digests in place of tags when pulling images or
        to use them in FROM lines in Dockerfiles.


        - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)



        ## Feedback

        For bug reports, feature requests, and general feedback; please create an
        issue in [step-security/secure-repo](https://github.com/step-security/secure-repo)
        or contact us via [our website](https://www.stepsecurity.io/).



        '
      change_url: https://github.com/vexxhost/atmosphere/pull/3725
      child_jobs: []
      commit_id: b56070d9c83eeec0d7c345af25edfe38f4706f19
      event_id: bd1eea10-18f5-11f1-8b81-18bbc05db965
      executor:
        hostname: 0a8996d2b663
        inventory_file: /var/lib/zuul/builds/39074fcc0fd3414facda2fadc94b6e0c/ansible/inventory.yaml
        log_root: /var/lib/zuul/builds/39074fcc0fd3414facda2fadc94b6e0c/work/logs
        result_data_file: /var/lib/zuul/builds/39074fcc0fd3414facda2fadc94b6e0c/work/results.json
        src_root: /var/lib/zuul/builds/39074fcc0fd3414facda2fadc94b6e0c/work/src
        work_root: /var/lib/zuul/builds/39074fcc0fd3414facda2fadc94b6e0c/work
      include_vars: []
      items:
      - branch: main
        change: '3725'
        change_message: '[StepSecurity] Apply security best practices


          ## Summary


          This pull request has been generated by [StepSecurity](https://app.stepsecurity.io/github/vexxhost/actions/dashboard)
          as part of your enterprise subscription to ensure compliance with recommended
          security best practices. Please review and merge the pull request to apply
          these security enhancements.


          ## Security Fixes


          ### Harden Runner


          Harden-Runner is an open-source security agent for the GitHub-hosted runner
          to prevent software supply chain attacks. It prevents exfiltration of credentials,
          detects tampering of source code during build, and enables running jobs
          without sudo access.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#dangerous-workflow)

          ### Least Privileged GitHub Actions Token Permissions


          The GITHUB_TOKEN is an automatically generated secret to make authenticated
          calls to the GitHub API. GitHub recommends setting minimum token permissions
          for the GITHUB_TOKEN.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#using-the-github_token-in-a-workflow)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions)


          ### Pinned Dependencies


          Pinning GitHub Actions to specific versions or commit SHAs ensures that
          your workflows remain consistent and secure.

          Unpinned actions can lead to unexpected changes or vulnerabilities caused
          by upstream updates.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)

          ### StepSecurity Maintained Actions


          Risky GitHub Actions can expose your project to potential security risks.
          Risky actions have been replaced with StepSecurity maintained actions, that
          are secure drop-in replacements.


          - [StepSecurity Maintained Actions](https://docs.stepsecurity.io/actions/stepsecurity-maintained-actions)

          ### Secure Dockerfiles


          Pin image tags to digests in Dockerfiles. With the Docker v2 API release,
          it became possible to use digests in place of tags when pulling images or
          to use them in FROM lines in Dockerfiles.


          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)



          ## Feedback

          For bug reports, feature requests, and general feedback; please create an
          issue in [step-security/secure-repo](https://github.com/step-security/secure-repo)
          or contact us via [our website](https://www.stepsecurity.io/).



          '
        change_url: https://github.com/vexxhost/atmosphere/pull/3725
        commit_id: b56070d9c83eeec0d7c345af25edfe38f4706f19
        patchset: b56070d9c83eeec0d7c345af25edfe38f4706f19
        project:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/atmosphere
          name: vexxhost/atmosphere
          short_name: atmosphere
          src_dir: src/github.com/vexxhost/atmosphere
        topic: null
      job: atmosphere-molecule-aio-ovn
      jobtags: []
      max_attempts: 3
      message: W1N0ZXBTZWN1cml0eV0gQXBwbHkgc2VjdXJpdHkgYmVzdCBwcmFjdGljZXMKCiMjIFN1bW1hcnkKClRoaXMgcHVsbCByZXF1ZXN0IGhhcyBiZWVuIGdlbmVyYXRlZCBieSBbU3RlcFNlY3VyaXR5XShodHRwczovL2FwcC5zdGVwc2VjdXJpdHkuaW8vZ2l0aHViL3ZleHhob3N0L2FjdGlvbnMvZGFzaGJvYXJkKSBhcyBwYXJ0IG9mIHlvdXIgZW50ZXJwcmlzZSBzdWJzY3JpcHRpb24gdG8gZW5zdXJlIGNvbXBsaWFuY2Ugd2l0aCByZWNvbW1lbmRlZCBzZWN1cml0eSBiZXN0IHByYWN0aWNlcy4gUGxlYXNlIHJldmlldyBhbmQgbWVyZ2UgdGhlIHB1bGwgcmVxdWVzdCB0byBhcHBseSB0aGVzZSBzZWN1cml0eSBlbmhhbmNlbWVudHMuCgojIyBTZWN1cml0eSBGaXhlcwoKIyMjIEhhcmRlbiBSdW5uZXIKCkhhcmRlbi1SdW5uZXIgaXMgYW4gb3Blbi1zb3VyY2Ugc2VjdXJpdHkgYWdlbnQgZm9yIHRoZSBHaXRIdWItaG9zdGVkIHJ1bm5lciB0byBwcmV2ZW50IHNvZnR3YXJlIHN1cHBseSBjaGFpbiBhdHRhY2tzLiBJdCBwcmV2ZW50cyBleGZpbHRyYXRpb24gb2YgY3JlZGVudGlhbHMsIGRldGVjdHMgdGFtcGVyaW5nIG9mIHNvdXJjZSBjb2RlIGR1cmluZyBidWlsZCwgYW5kIGVuYWJsZXMgcnVubmluZyBqb2JzIHdpdGhvdXQgc3VkbyBhY2Nlc3MuCgotIFtHaXRIdWIgU2VjdXJpdHkgR3VpZGVdKGh0dHBzOi8vZG9jcy5naXRodWIuY29tL2VuL2FjdGlvbnMvc2VjdXJpdHktZm9yLWdpdGh1Yi1hY3Rpb25zL3NlY3VyaXR5LWd1aWRlcy9zZWN1cml0eS1oYXJkZW5pbmctZm9yLWdpdGh1Yi1hY3Rpb25zKQotIFtUaGUgT3BlbiBTb3VyY2UgU2VjdXJpdHkgRm91bmRhdGlvbiAoT3BlblNTRikgU2VjdXJpdHkgR3VpZGVdKGh0dHBzOi8vZ2l0aHViLmNvbS9vc3NmL3Njb3JlY2FyZC9ibG9iL21haW4vZG9jcy9jaGVja3MubWQjZGFuZ2Vyb3VzLXdvcmtmbG93KQojIyMgTGVhc3QgUHJpdmlsZWdlZCBHaXRIdWIgQWN0aW9ucyBUb2tlbiBQZXJtaXNzaW9ucwoKVGhlIEdJVEhVQl9UT0tFTiBpcyBhbiBhdXRvbWF0aWNhbGx5IGdlbmVyYXRlZCBzZWNyZXQgdG8gbWFrZSBhdXRoZW50aWNhdGVkIGNhbGxzIHRvIHRoZSBHaXRIdWIgQVBJLiBHaXRIdWIgcmVjb21tZW5kcyBzZXR0aW5nIG1pbmltdW0gdG9rZW4gcGVybWlzc2lvbnMgZm9yIHRoZSBHSVRIVUJfVE9LRU4uCgotIFtHaXRIdWIgU2VjdXJpdHkgR3VpZGVdKGh0dHBzOi8vZG9jcy5naXRodWIuY29tL2VuL2FjdGlvbnMvc2VjdXJpdHktZ3VpZGVzL2F1dG9tYXRpYy10b2tlbi1hdXRoZW50aWNhdGlvbiN1c2luZy10aGUtZ2l0aHViX3Rva2VuLWluLWEtd29ya2Zsb3cpCi0gW1RoZSBPcGVuIFNvdXJjZSBTZWN1cml0eSBGb3VuZGF0aW9uIChPcGVuU1NGKSBTZWN1cml0eSBHdWlkZV0oaHR0cHM6Ly9naXRodWIuY29tL29zc2Yvc2NvcmVjYXJkL2Jsb2IvbWFpbi9kb2NzL2NoZWNrcy5tZCN0b2tlbi1wZXJtaXNzaW9ucykKCiMjIyBQaW5uZWQgRGVwZW5kZW5jaWVzCgpQaW5uaW5nIEdpdEh1YiBBY3Rpb25zIHRvIHNwZWNpZmljIHZlcnNpb25zIG9yIGNvbW1pdCBTSEFzIGVuc3VyZXMgdGhhdCB5b3VyIHdvcmtmbG93cyByZW1haW4gY29uc2lzdGVudCBhbmQgc2VjdXJlLgpVbnBpbm5lZCBhY3Rpb25zIGNhbiBsZWFkIHRvIHVuZXhwZWN0ZWQgY2hhbmdlcyBvciB2dWxuZXJhYmlsaXRpZXMgY2F1c2VkIGJ5IHVwc3RyZWFtIHVwZGF0ZXMuCgotIFtHaXRIdWIgU2VjdXJpdHkgR3VpZGVdKGh0dHBzOi8vZG9jcy5naXRodWIuY29tL2VuL2FjdGlvbnMvc2VjdXJpdHktZm9yLWdpdGh1Yi1hY3Rpb25zL3NlY3VyaXR5LWd1aWRlcy9zZWN1cml0eS1oYXJkZW5pbmctZm9yLWdpdGh1Yi1hY3Rpb25zI3VzaW5nLXRoaXJkLXBhcnR5LWFjdGlvbnMpCi0gW1RoZSBPcGVuIFNvdXJjZSBTZWN1cml0eSBGb3VuZGF0aW9uIChPcGVuU1NGKSBTZWN1cml0eSBHdWlkZV0oaHR0cHM6Ly9naXRodWIuY29tL29zc2Yvc2NvcmVjYXJkL2Jsb2IvbWFpbi9kb2NzL2NoZWNrcy5tZCNwaW5uZWQtZGVwZW5kZW5jaWVzKQojIyMgU3RlcFNlY3VyaXR5IE1haW50YWluZWQgQWN0aW9ucwoKUmlza3kgR2l0SHViIEFjdGlvbnMgY2FuIGV4cG9zZSB5b3VyIHByb2plY3QgdG8gcG90ZW50aWFsIHNlY3VyaXR5IHJpc2tzLiBSaXNreSBhY3Rpb25zIGhhdmUgYmVlbiByZXBsYWNlZCB3aXRoIFN0ZXBTZWN1cml0eSBtYWludGFpbmVkIGFjdGlvbnMsIHRoYXQgYXJlIHNlY3VyZSBkcm9wLWluIHJlcGxhY2VtZW50cy4KCi0gW1N0ZXBTZWN1cml0eSBNYWludGFpbmVkIEFjdGlvbnNdKGh0dHBzOi8vZG9jcy5zdGVwc2VjdXJpdHkuaW8vYWN0aW9ucy9zdGVwc2VjdXJpdHktbWFpbnRhaW5lZC1hY3Rpb25zKQojIyMgU2VjdXJlIERvY2tlcmZpbGVzCgpQaW4gaW1hZ2UgdGFncyB0byBkaWdlc3RzIGluIERvY2tlcmZpbGVzLiBXaXRoIHRoZSBEb2NrZXIgdjIgQVBJIHJlbGVhc2UsIGl0IGJlY2FtZSBwb3NzaWJsZSB0byB1c2UgZGlnZXN0cyBpbiBwbGFjZSBvZiB0YWdzIHdoZW4gcHVsbGluZyBpbWFnZXMgb3IgdG8gdXNlIHRoZW0gaW4gRlJPTSBsaW5lcyBpbiBEb2NrZXJmaWxlcy4KCi0gW1RoZSBPcGVuIFNvdXJjZSBTZWN1cml0eSBGb3VuZGF0aW9uIChPcGVuU1NGKSBTZWN1cml0eSBHdWlkZV0oaHR0cHM6Ly9naXRodWIuY29tL29zc2Yvc2NvcmVjYXJkL2Jsb2IvbWFpbi9kb2NzL2NoZWNrcy5tZCNwaW5uZWQtZGVwZW5kZW5jaWVzKQoKCiMjIEZlZWRiYWNrCkZvciBidWcgcmVwb3J0cywgZmVhdHVyZSByZXF1ZXN0cywgYW5kIGdlbmVyYWwgZmVlZGJhY2s7IHBsZWFzZSBjcmVhdGUgYW4gaXNzdWUgaW4gW3N0ZXAtc2VjdXJpdHkvc2VjdXJlLXJlcG9dKGh0dHBzOi8vZ2l0aHViLmNvbS9zdGVwLXNlY3VyaXR5L3NlY3VyZS1yZXBvKSBvciBjb250YWN0IHVzIHZpYSBbb3VyIHdlYnNpdGVdKGh0dHBzOi8vd3d3LnN0ZXBzZWN1cml0eS5pby8pLgoKCg==
      patchset: b56070d9c83eeec0d7c345af25edfe38f4706f19
      pipeline: check
      playbook_context:
        playbook_projects:
          trusted/project_0/github.com/vexxhost/zuul-config:
            canonical_name: github.com/vexxhost/zuul-config
            checkout: main
            commit: 9052b5a7781b3346e4cffd452a54448cbff54d8b
          trusted/project_1/opendev.org/zuul/zuul-jobs:
            canonical_name: opendev.org/zuul/zuul-jobs
            checkout: master
            commit: 571c0efa3491d12ecb8fc1169c510716d55c0fc2
          trusted/project_2/github.com/vexxhost/zuul-jobs:
            canonical_name: github.com/vexxhost/zuul-jobs
            checkout: main
            commit: a6e68243e02ef030ce5e75f8b67630880c475f33
          untrusted/project_0/github.com/vexxhost/zuul-jobs:
            canonical_name: github.com/vexxhost/zuul-jobs
            checkout: main
            commit: a6e68243e02ef030ce5e75f8b67630880c475f33
          untrusted/project_1/github.com/vexxhost/zuul-config:
            canonical_name: github.com/vexxhost/zuul-config
            checkout: main
            commit: 9052b5a7781b3346e4cffd452a54448cbff54d8b
          untrusted/project_2/opendev.org/zuul/zuul-jobs:
            canonical_name: opendev.org/zuul/zuul-jobs
            checkout: master
            commit: 571c0efa3491d12ecb8fc1169c510716d55c0fc2
          untrusted/project_3/github.com/vexxhost/atmosphere:
            canonical_name: github.com/vexxhost/atmosphere
            checkout: main
            commit: 731d3c6b2ec823e5821b11f0591e2e5ee25515c0
          untrusted/project_4/opendev.org/openstack/openstack-helm:
            canonical_name: opendev.org/openstack/openstack-helm
            checkout: master
            commit: 3bc47c1e93f78e4df2e1040d553777068eb33d92
        playbooks:
        - path: untrusted/project_0/github.com/vexxhost/zuul-jobs/playbooks/molecule/run.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/playbook_0/role_1/zuul-jobs
            link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs
            role_path: ansible/playbook_0/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: playbook branch
            link_name: ansible/playbook_0/role_2/zuul-jobs
            link_target: untrusted/project_0/github.com/vexxhost/zuul-jobs
            role_path: ansible/playbook_0/role_2/zuul-jobs/roles
        post_playbooks:
        - path: untrusted/project_3/github.com/vexxhost/atmosphere/test-playbooks/molecule/post.yml
          roles:
          - checkout: main
            checkout_description: playbook branch
            link_name: ansible/post_playbook_0/role_0/atmosphere
            link_target: untrusted/project_3/github.com/vexxhost/atmosphere
            role_path: ansible/post_playbook_0/role_0/atmosphere/roles
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/post_playbook_0/role_1/openstack-helm
            link_target: untrusted/project_4/opendev.org/openstack/openstack-helm
            role_path: ansible/post_playbook_0/role_1/openstack-helm/roles
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/post_playbook_0/role_3/zuul-jobs
            link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs
            role_path: ansible/post_playbook_0/role_3/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/post_playbook_0/role_4/zuul-jobs
            link_target: untrusted/project_0/github.com/vexxhost/zuul-jobs
            role_path: ansible/post_playbook_0/role_4/zuul-jobs/roles
        - path: trusted/project_0/github.com/vexxhost/zuul-config/playbooks/base/post.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/post_playbook_1/role_1/zuul-jobs
            link_target: trusted/project_1/opendev.org/zuul/zuul-jobs
            role_path: ansible/post_playbook_1/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/post_playbook_1/role_2/zuul-jobs
            link_target: trusted/project_2/github.com/vexxhost/zuul-jobs
            role_path: ansible/post_playbook_1/role_2/zuul-jobs/roles
        - path: trusted/project_0/github.com/vexxhost/zuul-config/playbooks/base/post-logs.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/post_playbook_2/role_1/zuul-jobs
            link_target: trusted/project_1/opendev.org/zuul/zuul-jobs
            role_path: ansible/post_playbook_2/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/post_playbook_2/role_2/zuul-jobs
            link_target: trusted/project_2/github.com/vexxhost/zuul-jobs
            role_path: ansible/post_playbook_2/role_2/zuul-jobs/roles
        pre_playbooks:
        - path: trusted/project_0/github.com/vexxhost/zuul-config/playbooks/base/pre.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/pre_playbook_0/role_1/zuul-jobs
            link_target: trusted/project_1/opendev.org/zuul/zuul-jobs
            role_path: ansible/pre_playbook_0/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/pre_playbook_0/role_2/zuul-jobs
            link_target: trusted/project_2/github.com/vexxhost/zuul-jobs
            role_path: ansible/pre_playbook_0/role_2/zuul-jobs/roles
        - path: untrusted/project_0/github.com/vexxhost/zuul-jobs/playbooks/molecule/pre.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/pre_playbook_1/role_1/zuul-jobs
            link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs
            role_path: ansible/pre_playbook_1/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: playbook branch
            link_name: ansible/pre_playbook_1/role_2/zuul-jobs
            link_target: untrusted/project_0/github.com/vexxhost/zuul-jobs
            role_path: ansible/pre_playbook_1/role_2/zuul-jobs/roles
        - path: untrusted/project_3/github.com/vexxhost/atmosphere/test-playbooks/molecule/pre.yml
          roles:
          - checkout: main
            checkout_description: playbook branch
            link_name: ansible/pre_playbook_2/role_0/atmosphere
            link_target: untrusted/project_3/github.com/vexxhost/atmosphere
            role_path: ansible/pre_playbook_2/role_0/atmosphere/roles
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/pre_playbook_2/role_1/openstack-helm
            link_target: untrusted/project_4/opendev.org/openstack/openstack-helm
            role_path: ansible/pre_playbook_2/role_1/openstack-helm/roles
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/pre_playbook_2/role_3/zuul-jobs
            link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs
            role_path: ansible/pre_playbook_2/role_3/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/pre_playbook_2/role_4/zuul-jobs
            link_target: untrusted/project_0/github.com/vexxhost/zuul-jobs
            role_path: ansible/pre_playbook_2/role_4/zuul-jobs/roles
      post_review: false
      post_timeout: null
      pre_timeout: null
      project:
        canonical_hostname: github.com
        canonical_name: github.com/vexxhost/atmosphere
        name: vexxhost/atmosphere
        short_name: atmosphere
        src_dir: src/github.com/vexxhost/atmosphere
      projects:
        github.com/vexxhost/atmosphere:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/atmosphere
          checkout: main
          checkout_description: zuul branch
          commit: 731d3c6b2ec823e5821b11f0591e2e5ee25515c0
          name: vexxhost/atmosphere
          required: false
          short_name: atmosphere
          src_dir: src/github.com/vexxhost/atmosphere
      ref: refs/pull/3725/head
      resources: {}
      tenant: oss
      timeout: 7200
      topic: null
      voting: true
