all:
  children:
    zuul_unreachable:
      hosts: {}
  hosts:
    rockylinux-9:
      ansible_connection: ssh
      ansible_host: 162.253.55.43
      ansible_port: 22
      ansible_python_interpreter: /usr/bin/python3
      ansible_user: zuul
      docker_version: 24.0.9
      molecule_scenario: docker
      nodepool:
        az: nova
        cloud: public
        external_id: 122c9845-72fb-4f98-8b26-ed47c767adff
        host_id: f373a28d302a4990c6af48a982661c254feecb826df4c059c9d84662
        interface_ip: 162.253.55.43
        label: rockylinux-9
        node_properties: {}
        private_ipv4: 162.253.55.43
        private_ipv6: null
        provider: yul1
        public_ipv4: 162.253.55.43
        public_ipv6: 2604:e100:1:0:f816:3eff:fecb:60ed
        region: ca-ymq-1
        slot: null
      zuul_node:
        az: nova
        cloud: public
        external_id: 122c9845-72fb-4f98-8b26-ed47c767adff
        host_id: f373a28d302a4990c6af48a982661c254feecb826df4c059c9d84662
        interface_ip: 162.253.55.43
        label: rockylinux-9
        node_properties: {}
        private_ipv4: 162.253.55.43
        private_ipv6: null
        provider: yul1
        public_ipv4: 162.253.55.43
        public_ipv6: 2604:e100:1:0:f816:3eff:fecb:60ed
        region: ca-ymq-1
        slot: null
        uuid: null
  vars:
    docker_version: 24.0.9
    molecule_scenario: docker
    zuul:
      _inheritance_path:
      - '<Job base explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/zuul-config/zuul.d/jobs.yaml@main#1>'
      - '<Job molecule explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/zuul-jobs/zuul.d/ansible-jobs.yaml@main#1>'
      - '<Job ansible-collection-containers-molecule explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/ansible-collection-containers/.zuul.yaml@main#1>'
      - '<Job ansible-collection-containers-molecule-docker explicit: None implied:
        {MatchAny:{ImpliedBranchMatcher:main}} source: vexxhost/ansible-collection-containers/.zuul.yaml@main#39>'
      - '<Job ansible-collection-containers-molecule-docker-rockylinux-9 explicit:
        None implied: {MatchAny:{ImpliedBranchMatcher:main}} source: vexxhost/ansible-collection-containers/.zuul.yaml@main#52>'
      - '<Job ansible-collection-containers-molecule-docker-rockylinux-9 explicit:
        None implied: None source: vexxhost/ansible-collection-containers/.zuul.yaml@main#136>'
      ansible_version: '9'
      attempts: 1
      branch: main
      build: 79554501f5c54a7e9bbd1a243f46f3ec
      build_refs:
      - branch: main
        change: '97'
        change_message: '[StepSecurity] Apply security best practices


          ## Summary


          This pull request has been generated by [StepSecurity](https://app.stepsecurity.io/github/vexxhost/actions/dashboard)
          as part of your enterprise subscription to ensure compliance with recommended
          security best practices. Please review and merge the pull request to apply
          these security enhancements.


          ## Security Fixes


          ### Harden Runner


          Harden-Runner is an open-source security agent for the GitHub-hosted runner
          to prevent software supply chain attacks. It prevents exfiltration of credentials,
          detects tampering of source code during build, and enables running jobs
          without sudo access.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#dangerous-workflow)

          ### Least Privileged GitHub Actions Token Permissions


          The GITHUB_TOKEN is an automatically generated secret to make authenticated
          calls to the GitHub API. GitHub recommends setting minimum token permissions
          for the GITHUB_TOKEN.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#using-the-github_token-in-a-workflow)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions)


          ### Pinned Dependencies


          Pinning GitHub Actions to specific versions or commit SHAs ensures that
          your workflows remain consistent and secure.

          Unpinned actions can lead to unexpected changes or vulnerabilities caused
          by upstream updates.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)

          ### StepSecurity Maintained Actions


          Risky GitHub Actions can expose your project to potential security risks.
          Risky actions have been replaced with StepSecurity maintained actions, that
          are secure drop-in replacements.


          - [StepSecurity Maintained Actions](https://docs.stepsecurity.io/actions/stepsecurity-maintained-actions)



          ## Feedback

          For bug reports, feature requests, and general feedback; please create an
          issue in [step-security/secure-repo](https://github.com/step-security/secure-repo)
          or contact us via [our website](https://www.stepsecurity.io/).



          '
        change_url: https://github.com/vexxhost/ansible-collection-containers/pull/97
        commit_id: 4ce2e21225812b5496a82b542d7620af96d7ad9e
        patchset: 4ce2e21225812b5496a82b542d7620af96d7ad9e
        project:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-containers
          name: vexxhost/ansible-collection-containers
          short_name: ansible-collection-containers
          src_dir: src/github.com/vexxhost/ansible-collection-containers
        src_dir: src/github.com/vexxhost/ansible-collection-containers
        topic: null
      buildset: ebf25e0dd2d3411b8d482114693ac6a7
      buildset_refs:
      - branch: main
        change: '97'
        change_message: '[StepSecurity] Apply security best practices


          ## Summary


          This pull request has been generated by [StepSecurity](https://app.stepsecurity.io/github/vexxhost/actions/dashboard)
          as part of your enterprise subscription to ensure compliance with recommended
          security best practices. Please review and merge the pull request to apply
          these security enhancements.


          ## Security Fixes


          ### Harden Runner


          Harden-Runner is an open-source security agent for the GitHub-hosted runner
          to prevent software supply chain attacks. It prevents exfiltration of credentials,
          detects tampering of source code during build, and enables running jobs
          without sudo access.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#dangerous-workflow)

          ### Least Privileged GitHub Actions Token Permissions


          The GITHUB_TOKEN is an automatically generated secret to make authenticated
          calls to the GitHub API. GitHub recommends setting minimum token permissions
          for the GITHUB_TOKEN.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#using-the-github_token-in-a-workflow)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions)


          ### Pinned Dependencies


          Pinning GitHub Actions to specific versions or commit SHAs ensures that
          your workflows remain consistent and secure.

          Unpinned actions can lead to unexpected changes or vulnerabilities caused
          by upstream updates.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)

          ### StepSecurity Maintained Actions


          Risky GitHub Actions can expose your project to potential security risks.
          Risky actions have been replaced with StepSecurity maintained actions, that
          are secure drop-in replacements.


          - [StepSecurity Maintained Actions](https://docs.stepsecurity.io/actions/stepsecurity-maintained-actions)



          ## Feedback

          For bug reports, feature requests, and general feedback; please create an
          issue in [step-security/secure-repo](https://github.com/step-security/secure-repo)
          or contact us via [our website](https://www.stepsecurity.io/).



          '
        change_url: https://github.com/vexxhost/ansible-collection-containers/pull/97
        commit_id: 4ce2e21225812b5496a82b542d7620af96d7ad9e
        patchset: 4ce2e21225812b5496a82b542d7620af96d7ad9e
        project:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-containers
          name: vexxhost/ansible-collection-containers
          short_name: ansible-collection-containers
          src_dir: src/github.com/vexxhost/ansible-collection-containers
        src_dir: src/github.com/vexxhost/ansible-collection-containers
        topic: null
      change: '97'
      change_message: '[StepSecurity] Apply security best practices


        ## Summary


        This pull request has been generated by [StepSecurity](https://app.stepsecurity.io/github/vexxhost/actions/dashboard)
        as part of your enterprise subscription to ensure compliance with recommended
        security best practices. Please review and merge the pull request to apply
        these security enhancements.


        ## Security Fixes


        ### Harden Runner


        Harden-Runner is an open-source security agent for the GitHub-hosted runner
        to prevent software supply chain attacks. It prevents exfiltration of credentials,
        detects tampering of source code during build, and enables running jobs without
        sudo access.


        - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions)

        - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#dangerous-workflow)

        ### Least Privileged GitHub Actions Token Permissions


        The GITHUB_TOKEN is an automatically generated secret to make authenticated
        calls to the GitHub API. GitHub recommends setting minimum token permissions
        for the GITHUB_TOKEN.


        - [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#using-the-github_token-in-a-workflow)

        - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions)


        ### Pinned Dependencies


        Pinning GitHub Actions to specific versions or commit SHAs ensures that your
        workflows remain consistent and secure.

        Unpinned actions can lead to unexpected changes or vulnerabilities caused
        by upstream updates.


        - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)

        - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)

        ### StepSecurity Maintained Actions


        Risky GitHub Actions can expose your project to potential security risks.
        Risky actions have been replaced with StepSecurity maintained actions, that
        are secure drop-in replacements.


        - [StepSecurity Maintained Actions](https://docs.stepsecurity.io/actions/stepsecurity-maintained-actions)



        ## Feedback

        For bug reports, feature requests, and general feedback; please create an
        issue in [step-security/secure-repo](https://github.com/step-security/secure-repo)
        or contact us via [our website](https://www.stepsecurity.io/).



        '
      change_url: https://github.com/vexxhost/ansible-collection-containers/pull/97
      child_jobs: []
      commit_id: 4ce2e21225812b5496a82b542d7620af96d7ad9e
      event_id: 12f135d0-18ae-11f1-85c2-fd1165a7d91d
      executor:
        hostname: 0a8996d2b663
        inventory_file: /var/lib/zuul/builds/79554501f5c54a7e9bbd1a243f46f3ec/ansible/inventory.yaml
        log_root: /var/lib/zuul/builds/79554501f5c54a7e9bbd1a243f46f3ec/work/logs
        result_data_file: /var/lib/zuul/builds/79554501f5c54a7e9bbd1a243f46f3ec/work/results.json
        src_root: /var/lib/zuul/builds/79554501f5c54a7e9bbd1a243f46f3ec/work/src
        work_root: /var/lib/zuul/builds/79554501f5c54a7e9bbd1a243f46f3ec/work
      include_vars: []
      items:
      - branch: main
        change: '97'
        change_message: '[StepSecurity] Apply security best practices


          ## Summary


          This pull request has been generated by [StepSecurity](https://app.stepsecurity.io/github/vexxhost/actions/dashboard)
          as part of your enterprise subscription to ensure compliance with recommended
          security best practices. Please review and merge the pull request to apply
          these security enhancements.


          ## Security Fixes


          ### Harden Runner


          Harden-Runner is an open-source security agent for the GitHub-hosted runner
          to prevent software supply chain attacks. It prevents exfiltration of credentials,
          detects tampering of source code during build, and enables running jobs
          without sudo access.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#dangerous-workflow)

          ### Least Privileged GitHub Actions Token Permissions


          The GITHUB_TOKEN is an automatically generated secret to make authenticated
          calls to the GitHub API. GitHub recommends setting minimum token permissions
          for the GITHUB_TOKEN.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#using-the-github_token-in-a-workflow)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions)


          ### Pinned Dependencies


          Pinning GitHub Actions to specific versions or commit SHAs ensures that
          your workflows remain consistent and secure.

          Unpinned actions can lead to unexpected changes or vulnerabilities caused
          by upstream updates.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)

          ### StepSecurity Maintained Actions


          Risky GitHub Actions can expose your project to potential security risks.
          Risky actions have been replaced with StepSecurity maintained actions, that
          are secure drop-in replacements.


          - [StepSecurity Maintained Actions](https://docs.stepsecurity.io/actions/stepsecurity-maintained-actions)



          ## Feedback

          For bug reports, feature requests, and general feedback; please create an
          issue in [step-security/secure-repo](https://github.com/step-security/secure-repo)
          or contact us via [our website](https://www.stepsecurity.io/).



          '
        change_url: https://github.com/vexxhost/ansible-collection-containers/pull/97
        commit_id: 4ce2e21225812b5496a82b542d7620af96d7ad9e
        patchset: 4ce2e21225812b5496a82b542d7620af96d7ad9e
        project:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-containers
          name: vexxhost/ansible-collection-containers
          short_name: ansible-collection-containers
          src_dir: src/github.com/vexxhost/ansible-collection-containers
        topic: null
      job: ansible-collection-containers-molecule-docker-rockylinux-9
      jobtags: []
      max_attempts: 3
      message: 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
      patchset: 4ce2e21225812b5496a82b542d7620af96d7ad9e
      pipeline: check
      playbook_context:
        playbook_projects:
          trusted/project_0/github.com/vexxhost/zuul-config:
            canonical_name: github.com/vexxhost/zuul-config
            checkout: main
            commit: 9052b5a7781b3346e4cffd452a54448cbff54d8b
          trusted/project_1/opendev.org/zuul/zuul-jobs:
            canonical_name: opendev.org/zuul/zuul-jobs
            checkout: master
            commit: 571c0efa3491d12ecb8fc1169c510716d55c0fc2
          trusted/project_2/github.com/vexxhost/zuul-jobs:
            canonical_name: github.com/vexxhost/zuul-jobs
            checkout: main
            commit: a6e68243e02ef030ce5e75f8b67630880c475f33
          untrusted/project_0/github.com/vexxhost/zuul-jobs:
            canonical_name: github.com/vexxhost/zuul-jobs
            checkout: main
            commit: a6e68243e02ef030ce5e75f8b67630880c475f33
          untrusted/project_1/github.com/vexxhost/zuul-config:
            canonical_name: github.com/vexxhost/zuul-config
            checkout: main
            commit: 9052b5a7781b3346e4cffd452a54448cbff54d8b
          untrusted/project_2/opendev.org/zuul/zuul-jobs:
            canonical_name: opendev.org/zuul/zuul-jobs
            checkout: master
            commit: 571c0efa3491d12ecb8fc1169c510716d55c0fc2
        playbooks:
        - path: untrusted/project_0/github.com/vexxhost/zuul-jobs/playbooks/molecule/run.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/playbook_0/role_1/zuul-jobs
            link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs
            role_path: ansible/playbook_0/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: playbook branch
            link_name: ansible/playbook_0/role_2/zuul-jobs
            link_target: untrusted/project_0/github.com/vexxhost/zuul-jobs
            role_path: ansible/playbook_0/role_2/zuul-jobs/roles
        post_playbooks:
        - path: trusted/project_0/github.com/vexxhost/zuul-config/playbooks/base/post.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/post_playbook_0/role_1/zuul-jobs
            link_target: trusted/project_1/opendev.org/zuul/zuul-jobs
            role_path: ansible/post_playbook_0/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/post_playbook_0/role_2/zuul-jobs
            link_target: trusted/project_2/github.com/vexxhost/zuul-jobs
            role_path: ansible/post_playbook_0/role_2/zuul-jobs/roles
        - path: trusted/project_0/github.com/vexxhost/zuul-config/playbooks/base/post-logs.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/post_playbook_1/role_1/zuul-jobs
            link_target: trusted/project_1/opendev.org/zuul/zuul-jobs
            role_path: ansible/post_playbook_1/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/post_playbook_1/role_2/zuul-jobs
            link_target: trusted/project_2/github.com/vexxhost/zuul-jobs
            role_path: ansible/post_playbook_1/role_2/zuul-jobs/roles
        pre_playbooks:
        - path: trusted/project_0/github.com/vexxhost/zuul-config/playbooks/base/pre.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/pre_playbook_0/role_1/zuul-jobs
            link_target: trusted/project_1/opendev.org/zuul/zuul-jobs
            role_path: ansible/pre_playbook_0/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/pre_playbook_0/role_2/zuul-jobs
            link_target: trusted/project_2/github.com/vexxhost/zuul-jobs
            role_path: ansible/pre_playbook_0/role_2/zuul-jobs/roles
        - path: untrusted/project_0/github.com/vexxhost/zuul-jobs/playbooks/molecule/pre.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/pre_playbook_1/role_1/zuul-jobs
            link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs
            role_path: ansible/pre_playbook_1/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: playbook branch
            link_name: ansible/pre_playbook_1/role_2/zuul-jobs
            link_target: untrusted/project_0/github.com/vexxhost/zuul-jobs
            role_path: ansible/pre_playbook_1/role_2/zuul-jobs/roles
      post_review: false
      post_timeout: null
      pre_timeout: null
      project:
        canonical_hostname: github.com
        canonical_name: github.com/vexxhost/ansible-collection-containers
        name: vexxhost/ansible-collection-containers
        short_name: ansible-collection-containers
        src_dir: src/github.com/vexxhost/ansible-collection-containers
      projects:
        github.com/vexxhost/ansible-collection-containers:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-containers
          checkout: main
          checkout_description: zuul branch
          commit: 1c67e7c8844a9b6bf9fa4392ccb9f501258a56db
          name: vexxhost/ansible-collection-containers
          required: false
          short_name: ansible-collection-containers
          src_dir: src/github.com/vexxhost/ansible-collection-containers
      ref: refs/pull/97/head
      resources: {}
      tenant: oss
      timeout: 1800
      topic: null
      voting: true
