all:
  children:
    cephs:
      hosts:
        osd1: null
    controllers:
      hosts:
        mon1: null
    zuul_unreachable:
      hosts: {}
  hosts:
    mon1:
      ansible_connection: ssh
      ansible_host: 199.204.45.144
      ansible_port: 22
      ansible_python_interpreter: auto
      ansible_user: zuul
      ceph_conf_overrides:
      - option: osd crush chooseleaf type
        section: global
        value: 0
      - option: auth allow insecure global id reclaim
        section: mon
        value: false
      - option: mon data avail warn
        section: mon
        value: 10
      ceph_fsid: 1dff0e0f-3c44-48da-81cd-4f3c6e8722b2
      ceph_osd_devices:
      - /dev/ceph-{{ inventory_hostname_short }}-osd0/data
      - /dev/ceph-{{ inventory_hostname_short }}-osd1/data
      - /dev/ceph-{{ inventory_hostname_short }}-osd2/data
      ceph_version: 18.2.7
      molecule_scenario: default
      nodepool:
        az: nova
        cloud: public
        external_id: e6a4b3b1-1851-4302-85a3-54413bcc3ee1
        host_id: be92abac58cdf319c41ec3044bb265315879370c10aa7110cfdbfb5f
        interface_ip: 199.204.45.144
        label: ubuntu-noble
        node_properties: {}
        private_ipv4: 199.204.45.144
        private_ipv6: null
        provider: yul1
        public_ipv4: 199.204.45.144
        public_ipv6: 2604:e100:1:0:f816:3eff:fe82:2ffe
        region: ca-ymq-1
        slot: null
      zuul_node:
        az: nova
        cloud: public
        external_id: e6a4b3b1-1851-4302-85a3-54413bcc3ee1
        host_id: be92abac58cdf319c41ec3044bb265315879370c10aa7110cfdbfb5f
        interface_ip: 199.204.45.144
        label: ubuntu-noble
        node_properties: {}
        private_ipv4: 199.204.45.144
        private_ipv6: null
        provider: yul1
        public_ipv4: 199.204.45.144
        public_ipv6: 2604:e100:1:0:f816:3eff:fe82:2ffe
        region: ca-ymq-1
        slot: null
        uuid: null
    osd1:
      ansible_connection: ssh
      ansible_host: 199.204.45.35
      ansible_port: 22
      ansible_python_interpreter: auto
      ansible_user: zuul
      ceph_conf_overrides:
      - option: osd crush chooseleaf type
        section: global
        value: 0
      - option: auth allow insecure global id reclaim
        section: mon
        value: false
      - option: mon data avail warn
        section: mon
        value: 10
      ceph_fsid: 1dff0e0f-3c44-48da-81cd-4f3c6e8722b2
      ceph_osd_devices:
      - /dev/ceph-{{ inventory_hostname_short }}-osd0/data
      - /dev/ceph-{{ inventory_hostname_short }}-osd1/data
      - /dev/ceph-{{ inventory_hostname_short }}-osd2/data
      ceph_version: 18.2.7
      molecule_scenario: default
      nodepool:
        az: nova
        cloud: public
        external_id: 40b75720-a1ac-4497-b3bc-a7afcbf2b77e
        host_id: be92abac58cdf319c41ec3044bb265315879370c10aa7110cfdbfb5f
        interface_ip: 199.204.45.35
        label: ubuntu-noble
        node_properties: {}
        private_ipv4: 199.204.45.35
        private_ipv6: null
        provider: yul1
        public_ipv4: 199.204.45.35
        public_ipv6: 2604:e100:1:0:f816:3eff:fe87:1255
        region: ca-ymq-1
        slot: null
      zuul_node:
        az: nova
        cloud: public
        external_id: 40b75720-a1ac-4497-b3bc-a7afcbf2b77e
        host_id: be92abac58cdf319c41ec3044bb265315879370c10aa7110cfdbfb5f
        interface_ip: 199.204.45.35
        label: ubuntu-noble
        node_properties: {}
        private_ipv4: 199.204.45.35
        private_ipv6: null
        provider: yul1
        public_ipv4: 199.204.45.35
        public_ipv6: 2604:e100:1:0:f816:3eff:fe87:1255
        region: ca-ymq-1
        slot: null
        uuid: null
  vars:
    ceph_conf_overrides:
    - option: osd crush chooseleaf type
      section: global
      value: 0
    - option: auth allow insecure global id reclaim
      section: mon
      value: false
    - option: mon data avail warn
      section: mon
      value: 10
    ceph_fsid: 1dff0e0f-3c44-48da-81cd-4f3c6e8722b2
    ceph_osd_devices:
    - /dev/ceph-{{ inventory_hostname_short }}-osd0/data
    - /dev/ceph-{{ inventory_hostname_short }}-osd1/data
    - /dev/ceph-{{ inventory_hostname_short }}-osd2/data
    ceph_version: 18.2.7
    molecule_scenario: default
    zuul:
      _inheritance_path:
      - '<Job base explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/zuul-config/zuul.d/jobs.yaml@main#1>'
      - '<Job molecule explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/zuul-jobs/zuul.d/ansible-jobs.yaml@main#1>'
      - '<Job ansible-collection-ceph-molecule explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/ansible-collection-ceph/.zuul.yaml@main#57>'
      - '<Job ansible-collection-ceph-molecule-ha-ubuntu-noble explicit: None implied:
        {MatchAny:{ImpliedBranchMatcher:main}} source: vexxhost/ansible-collection-ceph/.zuul.yaml@main#94>'
      - '<Job ansible-collection-ceph-molecule-ha-ubuntu-noble explicit: None implied:
        None source: vexxhost/ansible-collection-ceph/.zuul.yaml@main#99>'
      ansible_version: '9'
      attempts: 1
      branch: main
      build: 4e8ce59d4bbb496ead8d0480e327a242
      build_refs:
      - branch: main
        change: '96'
        change_message: "chore(deps): update step-security/harden-runner action to
          v2.18.0\n\nThis PR contains the following updates:\n\n| Package | Type |
          Update | Change |\n|---|---|---|---|\n| [step-security/harden-runner](https://redirect.github.com/step-security/harden-runner)
          | action | minor | `v2.15.0` \u2192 `v2.18.0` |\n\n---\n\n### Release Notes\n\n<details>\n<summary>step-security/harden-runner
          (step-security/harden-runner)</summary>\n\n### [`v2.18.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.18.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0)\n\n#####
          What's Changed\n\nGlobal Block List: During supply chain incidents like
          the recent axios and trivy compromises, StepSecurity will add known malicious
          domains and IP addresses (IOCs) to a global block list. These will be automatically
          blocked, even in audit mode, providing immediate protection without requiring
          any workflow changes.\n\nDeploy on Self-Hosted VM: Added `deploy-on-self-hosted-vm`
          input that allows the Harden Runner agent to be installed directly on ephemeral
          self-hosted Linux runner VMs at workflow runtime. This is intended as an
          alternative when baking the agent into the VM image is not possible.\n\n**Full
          Changelog**: <https://github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0>\n\n###
          [`v2.17.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.17.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0)\n\n#####
          What's Changed\n\n##### Policy Store Support\n\nAdded `use-policy-store`
          and `api-key` inputs to fetch security policies directly from the [StepSecurity
          Policy Store](https://docs.stepsecurity.io/harden-runner/policy-store).
          Policies can be defined and attached at the workflow, repo, org, or cluster
          (ARC) level, with the most granular policy taking precedence. This is the
          preferred method over the existing `policy` input which requires `id-token:
          write` permission. If no policy is found in the store, the action defaults
          to audit mode.\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0>\n\n###
          [`v2.16.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.1)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1)\n\n#####
          What's Changed\n\nEnterprise tier: Added support for direct IP addresses
          in the allow list\nCommunity tier: Migrated Harden Runner telemetry to a
          new endpoint\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1>\n\n###
          [`v2.16.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0)\n\n####
          What's Changed\n\n- Updated action.yml to use node24\n- Security fix: Fixed
          a medium severity vulnerability where the egress block policy could be bypassed
          via DNS over HTTPS (DoH) by proxying DNS queries through a permitted resolver,
          allowing data exfiltration even with a restrictive allowed-endpoints list.
          This issue only affects the Community Tier; the Enterprise Tier is not affected.
          See [GHSA-46g3-37rh-v698](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-46g3-37rh-v698)
          for details.\n- Security fix: Fixed a medium severity vulnerability where
          the egress block policy could be bypassed via DNS queries over TCP to external
          resolvers, allowing outbound network communication that evades configured
          network restrictions. This issue only affects the Community Tier; the Enterprise
          Tier is not affected. See [GHSA-g699-3x6g-wm3g](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-g699-3x6g-wm3g)
          for details.\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0>\n\n###
          [`v2.15.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.15.1)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1)\n\n#####
          What's Changed\n\n- Fixes [#&#8203;642](https://redirect.github.com/step-security/harden-runner/issues/642)
          bug due to which post step was failing on Windows ARM runners\n- Updates
          npm packages\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1>\n\n</details>\n\n---\n\n###
          Configuration\n\n\U0001F4C5 **Schedule**: (UTC)\n\n- Branch creation\n  -
          At any time (no schedule defined)\n- Automerge\n  - At any time (no schedule
          defined)\n\n\U0001F6A6 **Automerge**: Disabled by config. Please merge this
          manually once you are satisfied.\n\n\u267B **Rebasing**: Whenever PR becomes
          conflicted, or you tick the rebase/retry checkbox.\n\n\U0001F515 **Ignore**:
          Close this PR and you won't be reminded about this update again.\n\n---\n\n
          - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this
          box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/).
          View the [repository job log](https://developer.mend.io/github/vexxhost/ansible-collection-ceph).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0My41Ni4wIiwidXBkYXRlZEluVmVyIjoiNDMuMTIwLjIiLCJ0YXJnZXRCcmFuY2giOiJtYWluIiwibGFiZWxzIjpbXX0=-->\n"
        change_url: https://github.com/vexxhost/ansible-collection-ceph/pull/96
        commit_id: d705bd6aa1d5c580e734061df83a68334eec8254
        patchset: d705bd6aa1d5c580e734061df83a68334eec8254
        project:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-ceph
          name: vexxhost/ansible-collection-ceph
          short_name: ansible-collection-ceph
          src_dir: src/github.com/vexxhost/ansible-collection-ceph
        src_dir: src/github.com/vexxhost/ansible-collection-ceph
        topic: null
      buildset: 78f60a65489048d6bce85170aca52535
      buildset_refs:
      - branch: main
        change: '96'
        change_message: "chore(deps): update step-security/harden-runner action to
          v2.18.0\n\nThis PR contains the following updates:\n\n| Package | Type |
          Update | Change |\n|---|---|---|---|\n| [step-security/harden-runner](https://redirect.github.com/step-security/harden-runner)
          | action | minor | `v2.15.0` \u2192 `v2.18.0` |\n\n---\n\n### Release Notes\n\n<details>\n<summary>step-security/harden-runner
          (step-security/harden-runner)</summary>\n\n### [`v2.18.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.18.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0)\n\n#####
          What's Changed\n\nGlobal Block List: During supply chain incidents like
          the recent axios and trivy compromises, StepSecurity will add known malicious
          domains and IP addresses (IOCs) to a global block list. These will be automatically
          blocked, even in audit mode, providing immediate protection without requiring
          any workflow changes.\n\nDeploy on Self-Hosted VM: Added `deploy-on-self-hosted-vm`
          input that allows the Harden Runner agent to be installed directly on ephemeral
          self-hosted Linux runner VMs at workflow runtime. This is intended as an
          alternative when baking the agent into the VM image is not possible.\n\n**Full
          Changelog**: <https://github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0>\n\n###
          [`v2.17.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.17.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0)\n\n#####
          What's Changed\n\n##### Policy Store Support\n\nAdded `use-policy-store`
          and `api-key` inputs to fetch security policies directly from the [StepSecurity
          Policy Store](https://docs.stepsecurity.io/harden-runner/policy-store).
          Policies can be defined and attached at the workflow, repo, org, or cluster
          (ARC) level, with the most granular policy taking precedence. This is the
          preferred method over the existing `policy` input which requires `id-token:
          write` permission. If no policy is found in the store, the action defaults
          to audit mode.\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0>\n\n###
          [`v2.16.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.1)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1)\n\n#####
          What's Changed\n\nEnterprise tier: Added support for direct IP addresses
          in the allow list\nCommunity tier: Migrated Harden Runner telemetry to a
          new endpoint\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1>\n\n###
          [`v2.16.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0)\n\n####
          What's Changed\n\n- Updated action.yml to use node24\n- Security fix: Fixed
          a medium severity vulnerability where the egress block policy could be bypassed
          via DNS over HTTPS (DoH) by proxying DNS queries through a permitted resolver,
          allowing data exfiltration even with a restrictive allowed-endpoints list.
          This issue only affects the Community Tier; the Enterprise Tier is not affected.
          See [GHSA-46g3-37rh-v698](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-46g3-37rh-v698)
          for details.\n- Security fix: Fixed a medium severity vulnerability where
          the egress block policy could be bypassed via DNS queries over TCP to external
          resolvers, allowing outbound network communication that evades configured
          network restrictions. This issue only affects the Community Tier; the Enterprise
          Tier is not affected. See [GHSA-g699-3x6g-wm3g](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-g699-3x6g-wm3g)
          for details.\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0>\n\n###
          [`v2.15.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.15.1)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1)\n\n#####
          What's Changed\n\n- Fixes [#&#8203;642](https://redirect.github.com/step-security/harden-runner/issues/642)
          bug due to which post step was failing on Windows ARM runners\n- Updates
          npm packages\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1>\n\n</details>\n\n---\n\n###
          Configuration\n\n\U0001F4C5 **Schedule**: (UTC)\n\n- Branch creation\n  -
          At any time (no schedule defined)\n- Automerge\n  - At any time (no schedule
          defined)\n\n\U0001F6A6 **Automerge**: Disabled by config. Please merge this
          manually once you are satisfied.\n\n\u267B **Rebasing**: Whenever PR becomes
          conflicted, or you tick the rebase/retry checkbox.\n\n\U0001F515 **Ignore**:
          Close this PR and you won't be reminded about this update again.\n\n---\n\n
          - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this
          box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/).
          View the [repository job log](https://developer.mend.io/github/vexxhost/ansible-collection-ceph).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0My41Ni4wIiwidXBkYXRlZEluVmVyIjoiNDMuMTIwLjIiLCJ0YXJnZXRCcmFuY2giOiJtYWluIiwibGFiZWxzIjpbXX0=-->\n"
        change_url: https://github.com/vexxhost/ansible-collection-ceph/pull/96
        commit_id: d705bd6aa1d5c580e734061df83a68334eec8254
        patchset: d705bd6aa1d5c580e734061df83a68334eec8254
        project:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-ceph
          name: vexxhost/ansible-collection-ceph
          short_name: ansible-collection-ceph
          src_dir: src/github.com/vexxhost/ansible-collection-ceph
        src_dir: src/github.com/vexxhost/ansible-collection-ceph
        topic: null
      change: '96'
      change_message: "chore(deps): update step-security/harden-runner action to v2.18.0\n\nThis
        PR contains the following updates:\n\n| Package | Type | Update | Change |\n|---|---|---|---|\n|
        [step-security/harden-runner](https://redirect.github.com/step-security/harden-runner)
        | action | minor | `v2.15.0` \u2192 `v2.18.0` |\n\n---\n\n### Release Notes\n\n<details>\n<summary>step-security/harden-runner
        (step-security/harden-runner)</summary>\n\n### [`v2.18.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.18.0)\n\n[Compare
        Source](https://redirect.github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0)\n\n#####
        What's Changed\n\nGlobal Block List: During supply chain incidents like the
        recent axios and trivy compromises, StepSecurity will add known malicious
        domains and IP addresses (IOCs) to a global block list. These will be automatically
        blocked, even in audit mode, providing immediate protection without requiring
        any workflow changes.\n\nDeploy on Self-Hosted VM: Added `deploy-on-self-hosted-vm`
        input that allows the Harden Runner agent to be installed directly on ephemeral
        self-hosted Linux runner VMs at workflow runtime. This is intended as an alternative
        when baking the agent into the VM image is not possible.\n\n**Full Changelog**:
        <https://github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0>\n\n###
        [`v2.17.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.17.0)\n\n[Compare
        Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0)\n\n#####
        What's Changed\n\n##### Policy Store Support\n\nAdded `use-policy-store` and
        `api-key` inputs to fetch security policies directly from the [StepSecurity
        Policy Store](https://docs.stepsecurity.io/harden-runner/policy-store). Policies
        can be defined and attached at the workflow, repo, org, or cluster (ARC) level,
        with the most granular policy taking precedence. This is the preferred method
        over the existing `policy` input which requires `id-token: write` permission.
        If no policy is found in the store, the action defaults to audit mode.\n\n**Full
        Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0>\n\n###
        [`v2.16.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.1)\n\n[Compare
        Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1)\n\n#####
        What's Changed\n\nEnterprise tier: Added support for direct IP addresses in
        the allow list\nCommunity tier: Migrated Harden Runner telemetry to a new
        endpoint\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1>\n\n###
        [`v2.16.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.0)\n\n[Compare
        Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0)\n\n####
        What's Changed\n\n- Updated action.yml to use node24\n- Security fix: Fixed
        a medium severity vulnerability where the egress block policy could be bypassed
        via DNS over HTTPS (DoH) by proxying DNS queries through a permitted resolver,
        allowing data exfiltration even with a restrictive allowed-endpoints list.
        This issue only affects the Community Tier; the Enterprise Tier is not affected.
        See [GHSA-46g3-37rh-v698](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-46g3-37rh-v698)
        for details.\n- Security fix: Fixed a medium severity vulnerability where
        the egress block policy could be bypassed via DNS queries over TCP to external
        resolvers, allowing outbound network communication that evades configured
        network restrictions. This issue only affects the Community Tier; the Enterprise
        Tier is not affected. See [GHSA-g699-3x6g-wm3g](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-g699-3x6g-wm3g)
        for details.\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0>\n\n###
        [`v2.15.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.15.1)\n\n[Compare
        Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1)\n\n#####
        What's Changed\n\n- Fixes [#&#8203;642](https://redirect.github.com/step-security/harden-runner/issues/642)
        bug due to which post step was failing on Windows ARM runners\n- Updates npm
        packages\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1>\n\n</details>\n\n---\n\n###
        Configuration\n\n\U0001F4C5 **Schedule**: (UTC)\n\n- Branch creation\n  -
        At any time (no schedule defined)\n- Automerge\n  - At any time (no schedule
        defined)\n\n\U0001F6A6 **Automerge**: Disabled by config. Please merge this
        manually once you are satisfied.\n\n\u267B **Rebasing**: Whenever PR becomes
        conflicted, or you tick the rebase/retry checkbox.\n\n\U0001F515 **Ignore**:
        Close this PR and you won't be reminded about this update again.\n\n---\n\n
        - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this
        box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/).
        View the [repository job log](https://developer.mend.io/github/vexxhost/ansible-collection-ceph).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0My41Ni4wIiwidXBkYXRlZEluVmVyIjoiNDMuMTIwLjIiLCJ0YXJnZXRCcmFuY2giOiJtYWluIiwibGFiZWxzIjpbXX0=-->\n"
      change_url: https://github.com/vexxhost/ansible-collection-ceph/pull/96
      child_jobs: []
      commit_id: d705bd6aa1d5c580e734061df83a68334eec8254
      event_id: 84badde0-38ae-11f1-8e11-15ac2b02dee5
      executor:
        hostname: 0a8996d2b663
        inventory_file: /var/lib/zuul/builds/4e8ce59d4bbb496ead8d0480e327a242/ansible/inventory.yaml
        log_root: /var/lib/zuul/builds/4e8ce59d4bbb496ead8d0480e327a242/work/logs
        result_data_file: /var/lib/zuul/builds/4e8ce59d4bbb496ead8d0480e327a242/work/results.json
        src_root: /var/lib/zuul/builds/4e8ce59d4bbb496ead8d0480e327a242/work/src
        work_root: /var/lib/zuul/builds/4e8ce59d4bbb496ead8d0480e327a242/work
      include_vars: []
      items:
      - branch: main
        change: '96'
        change_message: "chore(deps): update step-security/harden-runner action to
          v2.18.0\n\nThis PR contains the following updates:\n\n| Package | Type |
          Update | Change |\n|---|---|---|---|\n| [step-security/harden-runner](https://redirect.github.com/step-security/harden-runner)
          | action | minor | `v2.15.0` \u2192 `v2.18.0` |\n\n---\n\n### Release Notes\n\n<details>\n<summary>step-security/harden-runner
          (step-security/harden-runner)</summary>\n\n### [`v2.18.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.18.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0)\n\n#####
          What's Changed\n\nGlobal Block List: During supply chain incidents like
          the recent axios and trivy compromises, StepSecurity will add known malicious
          domains and IP addresses (IOCs) to a global block list. These will be automatically
          blocked, even in audit mode, providing immediate protection without requiring
          any workflow changes.\n\nDeploy on Self-Hosted VM: Added `deploy-on-self-hosted-vm`
          input that allows the Harden Runner agent to be installed directly on ephemeral
          self-hosted Linux runner VMs at workflow runtime. This is intended as an
          alternative when baking the agent into the VM image is not possible.\n\n**Full
          Changelog**: <https://github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0>\n\n###
          [`v2.17.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.17.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0)\n\n#####
          What's Changed\n\n##### Policy Store Support\n\nAdded `use-policy-store`
          and `api-key` inputs to fetch security policies directly from the [StepSecurity
          Policy Store](https://docs.stepsecurity.io/harden-runner/policy-store).
          Policies can be defined and attached at the workflow, repo, org, or cluster
          (ARC) level, with the most granular policy taking precedence. This is the
          preferred method over the existing `policy` input which requires `id-token:
          write` permission. If no policy is found in the store, the action defaults
          to audit mode.\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0>\n\n###
          [`v2.16.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.1)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1)\n\n#####
          What's Changed\n\nEnterprise tier: Added support for direct IP addresses
          in the allow list\nCommunity tier: Migrated Harden Runner telemetry to a
          new endpoint\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1>\n\n###
          [`v2.16.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0)\n\n####
          What's Changed\n\n- Updated action.yml to use node24\n- Security fix: Fixed
          a medium severity vulnerability where the egress block policy could be bypassed
          via DNS over HTTPS (DoH) by proxying DNS queries through a permitted resolver,
          allowing data exfiltration even with a restrictive allowed-endpoints list.
          This issue only affects the Community Tier; the Enterprise Tier is not affected.
          See [GHSA-46g3-37rh-v698](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-46g3-37rh-v698)
          for details.\n- Security fix: Fixed a medium severity vulnerability where
          the egress block policy could be bypassed via DNS queries over TCP to external
          resolvers, allowing outbound network communication that evades configured
          network restrictions. This issue only affects the Community Tier; the Enterprise
          Tier is not affected. See [GHSA-g699-3x6g-wm3g](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-g699-3x6g-wm3g)
          for details.\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0>\n\n###
          [`v2.15.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.15.1)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1)\n\n#####
          What's Changed\n\n- Fixes [#&#8203;642](https://redirect.github.com/step-security/harden-runner/issues/642)
          bug due to which post step was failing on Windows ARM runners\n- Updates
          npm packages\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1>\n\n</details>\n\n---\n\n###
          Configuration\n\n\U0001F4C5 **Schedule**: (UTC)\n\n- Branch creation\n  -
          At any time (no schedule defined)\n- Automerge\n  - At any time (no schedule
          defined)\n\n\U0001F6A6 **Automerge**: Disabled by config. Please merge this
          manually once you are satisfied.\n\n\u267B **Rebasing**: Whenever PR becomes
          conflicted, or you tick the rebase/retry checkbox.\n\n\U0001F515 **Ignore**:
          Close this PR and you won't be reminded about this update again.\n\n---\n\n
          - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this
          box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/).
          View the [repository job log](https://developer.mend.io/github/vexxhost/ansible-collection-ceph).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0My41Ni4wIiwidXBkYXRlZEluVmVyIjoiNDMuMTIwLjIiLCJ0YXJnZXRCcmFuY2giOiJtYWluIiwibGFiZWxzIjpbXX0=-->\n"
        change_url: https://github.com/vexxhost/ansible-collection-ceph/pull/96
        commit_id: d705bd6aa1d5c580e734061df83a68334eec8254
        patchset: d705bd6aa1d5c580e734061df83a68334eec8254
        project:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-ceph
          name: vexxhost/ansible-collection-ceph
          short_name: ansible-collection-ceph
          src_dir: src/github.com/vexxhost/ansible-collection-ceph
        topic: null
      job: ansible-collection-ceph-molecule-ha-ubuntu-noble
      jobtags: []
      max_attempts: 3
      message: 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
      patchset: d705bd6aa1d5c580e734061df83a68334eec8254
      pipeline: check
      playbook_context:
        playbook_projects:
          trusted/project_0/github.com/vexxhost/zuul-config:
            canonical_name: github.com/vexxhost/zuul-config
            checkout: main
            commit: 298983cd1253e6833abdb49d87d912527e0e6597
          trusted/project_1/opendev.org/zuul/zuul-jobs:
            canonical_name: opendev.org/zuul/zuul-jobs
            checkout: master
            commit: fc4af6d44718d2e648cf6396f3e96bb46a55117a
          trusted/project_2/github.com/vexxhost/zuul-jobs:
            canonical_name: github.com/vexxhost/zuul-jobs
            checkout: main
            commit: a6e68243e02ef030ce5e75f8b67630880c475f33
          untrusted/project_0/github.com/vexxhost/zuul-jobs:
            canonical_name: github.com/vexxhost/zuul-jobs
            checkout: main
            commit: a6e68243e02ef030ce5e75f8b67630880c475f33
          untrusted/project_1/github.com/vexxhost/zuul-config:
            canonical_name: github.com/vexxhost/zuul-config
            checkout: main
            commit: 298983cd1253e6833abdb49d87d912527e0e6597
          untrusted/project_2/opendev.org/zuul/zuul-jobs:
            canonical_name: opendev.org/zuul/zuul-jobs
            checkout: master
            commit: fc4af6d44718d2e648cf6396f3e96bb46a55117a
        playbooks:
        - path: untrusted/project_0/github.com/vexxhost/zuul-jobs/playbooks/molecule/run.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/playbook_0/role_1/zuul-jobs
            link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs
            role_path: ansible/playbook_0/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: playbook branch
            link_name: ansible/playbook_0/role_2/zuul-jobs
            link_target: untrusted/project_0/github.com/vexxhost/zuul-jobs
            role_path: ansible/playbook_0/role_2/zuul-jobs/roles
        post_playbooks:
        - path: trusted/project_0/github.com/vexxhost/zuul-config/playbooks/base/post.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/post_playbook_0/role_1/zuul-jobs
            link_target: trusted/project_1/opendev.org/zuul/zuul-jobs
            role_path: ansible/post_playbook_0/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/post_playbook_0/role_2/zuul-jobs
            link_target: trusted/project_2/github.com/vexxhost/zuul-jobs
            role_path: ansible/post_playbook_0/role_2/zuul-jobs/roles
        - path: trusted/project_0/github.com/vexxhost/zuul-config/playbooks/base/post-logs.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/post_playbook_1/role_1/zuul-jobs
            link_target: trusted/project_1/opendev.org/zuul/zuul-jobs
            role_path: ansible/post_playbook_1/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/post_playbook_1/role_2/zuul-jobs
            link_target: trusted/project_2/github.com/vexxhost/zuul-jobs
            role_path: ansible/post_playbook_1/role_2/zuul-jobs/roles
        pre_playbooks:
        - path: trusted/project_0/github.com/vexxhost/zuul-config/playbooks/base/pre.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/pre_playbook_0/role_1/zuul-jobs
            link_target: trusted/project_1/opendev.org/zuul/zuul-jobs
            role_path: ansible/pre_playbook_0/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/pre_playbook_0/role_2/zuul-jobs
            link_target: trusted/project_2/github.com/vexxhost/zuul-jobs
            role_path: ansible/pre_playbook_0/role_2/zuul-jobs/roles
        - path: untrusted/project_0/github.com/vexxhost/zuul-jobs/playbooks/molecule/pre.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/pre_playbook_1/role_1/zuul-jobs
            link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs
            role_path: ansible/pre_playbook_1/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: playbook branch
            link_name: ansible/pre_playbook_1/role_2/zuul-jobs
            link_target: untrusted/project_0/github.com/vexxhost/zuul-jobs
            role_path: ansible/pre_playbook_1/role_2/zuul-jobs/roles
      post_review: false
      post_timeout: null
      pre_timeout: null
      project:
        canonical_hostname: github.com
        canonical_name: github.com/vexxhost/ansible-collection-ceph
        name: vexxhost/ansible-collection-ceph
        short_name: ansible-collection-ceph
        src_dir: src/github.com/vexxhost/ansible-collection-ceph
      projects:
        github.com/vexxhost/ansible-collection-ceph:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-ceph
          checkout: main
          checkout_description: zuul branch
          commit: 7f8f1ef9d77bda6cf6dbee158e19842414662fa9
          name: vexxhost/ansible-collection-ceph
          required: false
          short_name: ansible-collection-ceph
          src_dir: src/github.com/vexxhost/ansible-collection-ceph
      ref: refs/pull/96/head
      resources: {}
      tenant: oss
      timeout: 1800
      topic: null
      voting: true
