all:
  children:
    zuul_unreachable:
      hosts: {}
  hosts:
    ubuntu-noble:
      ansible_connection: ssh
      ansible_host: 199.204.45.227
      ansible_port: 22
      ansible_python_interpreter: auto
      ansible_user: zuul
      molecule_scenario: nerdctl
      nodepool:
        az: nova
        cloud: public
        external_id: d5ab5c11-4efa-4ee4-a827-5fea5b8359dd
        host_id: c9670958829e9c96e47d452d2c9c4ce9edaac336d3dbc4a3c4ec531c
        interface_ip: 199.204.45.227
        label: ubuntu-noble
        node_properties: {}
        private_ipv4: 199.204.45.227
        private_ipv6: null
        provider: yul1
        public_ipv4: 199.204.45.227
        public_ipv6: 2604:e100:1:0:f816:3eff:fe71:3dc6
        region: ca-ymq-1
        slot: null
      zuul_node:
        az: nova
        cloud: public
        external_id: d5ab5c11-4efa-4ee4-a827-5fea5b8359dd
        host_id: c9670958829e9c96e47d452d2c9c4ce9edaac336d3dbc4a3c4ec531c
        interface_ip: 199.204.45.227
        label: ubuntu-noble
        node_properties: {}
        private_ipv4: 199.204.45.227
        private_ipv6: null
        provider: yul1
        public_ipv4: 199.204.45.227
        public_ipv6: 2604:e100:1:0:f816:3eff:fe71:3dc6
        region: ca-ymq-1
        slot: null
        uuid: null
  vars:
    molecule_scenario: nerdctl
    zuul:
      _inheritance_path:
      - '<Job base explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/zuul-config/zuul.d/jobs.yaml@main#1>'
      - '<Job molecule explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/zuul-jobs/zuul.d/ansible-jobs.yaml@main#1>'
      - '<Job ansible-collection-containers-molecule explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/ansible-collection-containers/.zuul.yaml@main#1>'
      - '<Job ansible-collection-containers-molecule-nerdctl explicit: None implied:
        {MatchAny:{ImpliedBranchMatcher:main}} source: vexxhost/ansible-collection-containers/.zuul.yaml@main#104>'
      - '<Job ansible-collection-containers-molecule-nerdctl-ubuntu-noble explicit:
        None implied: {MatchAny:{ImpliedBranchMatcher:main}} source: vexxhost/ansible-collection-containers/.zuul.yaml@main#131>'
      - '<Job ansible-collection-containers-molecule-nerdctl-ubuntu-noble explicit:
        None implied: None source: vexxhost/ansible-collection-containers/.zuul.yaml@main#136>'
      ansible_version: '9'
      attempts: 1
      branch: main
      build: 8ff8fb8fc4a54facbcef308982c8ce39
      build_refs:
      - branch: main
        change: '97'
        change_message: '[StepSecurity] Apply security best practices


          ## Summary


          This pull request has been generated by [StepSecurity](https://app.stepsecurity.io/github/vexxhost/actions/dashboard)
          as part of your enterprise subscription to ensure compliance with recommended
          security best practices. Please review and merge the pull request to apply
          these security enhancements.


          ## Security Fixes


          ### Harden Runner


          Harden-Runner is an open-source security agent for the GitHub-hosted runner
          to prevent software supply chain attacks. It prevents exfiltration of credentials,
          detects tampering of source code during build, and enables running jobs
          without sudo access.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#dangerous-workflow)

          ### Least Privileged GitHub Actions Token Permissions


          The GITHUB_TOKEN is an automatically generated secret to make authenticated
          calls to the GitHub API. GitHub recommends setting minimum token permissions
          for the GITHUB_TOKEN.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#using-the-github_token-in-a-workflow)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions)


          ### Pinned Dependencies


          Pinning GitHub Actions to specific versions or commit SHAs ensures that
          your workflows remain consistent and secure.

          Unpinned actions can lead to unexpected changes or vulnerabilities caused
          by upstream updates.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)

          ### StepSecurity Maintained Actions


          Risky GitHub Actions can expose your project to potential security risks.
          Risky actions have been replaced with StepSecurity maintained actions, that
          are secure drop-in replacements.


          - [StepSecurity Maintained Actions](https://docs.stepsecurity.io/actions/stepsecurity-maintained-actions)



          ## Feedback

          For bug reports, feature requests, and general feedback; please create an
          issue in [step-security/secure-repo](https://github.com/step-security/secure-repo)
          or contact us via [our website](https://www.stepsecurity.io/).



          '
        change_url: https://github.com/vexxhost/ansible-collection-containers/pull/97
        commit_id: 4ce2e21225812b5496a82b542d7620af96d7ad9e
        patchset: 4ce2e21225812b5496a82b542d7620af96d7ad9e
        project:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-containers
          name: vexxhost/ansible-collection-containers
          short_name: ansible-collection-containers
          src_dir: src/github.com/vexxhost/ansible-collection-containers
        src_dir: src/github.com/vexxhost/ansible-collection-containers
        topic: null
      buildset: ebf25e0dd2d3411b8d482114693ac6a7
      buildset_refs:
      - branch: main
        change: '97'
        change_message: '[StepSecurity] Apply security best practices


          ## Summary


          This pull request has been generated by [StepSecurity](https://app.stepsecurity.io/github/vexxhost/actions/dashboard)
          as part of your enterprise subscription to ensure compliance with recommended
          security best practices. Please review and merge the pull request to apply
          these security enhancements.


          ## Security Fixes


          ### Harden Runner


          Harden-Runner is an open-source security agent for the GitHub-hosted runner
          to prevent software supply chain attacks. It prevents exfiltration of credentials,
          detects tampering of source code during build, and enables running jobs
          without sudo access.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#dangerous-workflow)

          ### Least Privileged GitHub Actions Token Permissions


          The GITHUB_TOKEN is an automatically generated secret to make authenticated
          calls to the GitHub API. GitHub recommends setting minimum token permissions
          for the GITHUB_TOKEN.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#using-the-github_token-in-a-workflow)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions)


          ### Pinned Dependencies


          Pinning GitHub Actions to specific versions or commit SHAs ensures that
          your workflows remain consistent and secure.

          Unpinned actions can lead to unexpected changes or vulnerabilities caused
          by upstream updates.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)

          ### StepSecurity Maintained Actions


          Risky GitHub Actions can expose your project to potential security risks.
          Risky actions have been replaced with StepSecurity maintained actions, that
          are secure drop-in replacements.


          - [StepSecurity Maintained Actions](https://docs.stepsecurity.io/actions/stepsecurity-maintained-actions)



          ## Feedback

          For bug reports, feature requests, and general feedback; please create an
          issue in [step-security/secure-repo](https://github.com/step-security/secure-repo)
          or contact us via [our website](https://www.stepsecurity.io/).



          '
        change_url: https://github.com/vexxhost/ansible-collection-containers/pull/97
        commit_id: 4ce2e21225812b5496a82b542d7620af96d7ad9e
        patchset: 4ce2e21225812b5496a82b542d7620af96d7ad9e
        project:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-containers
          name: vexxhost/ansible-collection-containers
          short_name: ansible-collection-containers
          src_dir: src/github.com/vexxhost/ansible-collection-containers
        src_dir: src/github.com/vexxhost/ansible-collection-containers
        topic: null
      change: '97'
      change_message: '[StepSecurity] Apply security best practices


        ## Summary


        This pull request has been generated by [StepSecurity](https://app.stepsecurity.io/github/vexxhost/actions/dashboard)
        as part of your enterprise subscription to ensure compliance with recommended
        security best practices. Please review and merge the pull request to apply
        these security enhancements.


        ## Security Fixes


        ### Harden Runner


        Harden-Runner is an open-source security agent for the GitHub-hosted runner
        to prevent software supply chain attacks. It prevents exfiltration of credentials,
        detects tampering of source code during build, and enables running jobs without
        sudo access.


        - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions)

        - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#dangerous-workflow)

        ### Least Privileged GitHub Actions Token Permissions


        The GITHUB_TOKEN is an automatically generated secret to make authenticated
        calls to the GitHub API. GitHub recommends setting minimum token permissions
        for the GITHUB_TOKEN.


        - [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#using-the-github_token-in-a-workflow)

        - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions)


        ### Pinned Dependencies


        Pinning GitHub Actions to specific versions or commit SHAs ensures that your
        workflows remain consistent and secure.

        Unpinned actions can lead to unexpected changes or vulnerabilities caused
        by upstream updates.


        - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)

        - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)

        ### StepSecurity Maintained Actions


        Risky GitHub Actions can expose your project to potential security risks.
        Risky actions have been replaced with StepSecurity maintained actions, that
        are secure drop-in replacements.


        - [StepSecurity Maintained Actions](https://docs.stepsecurity.io/actions/stepsecurity-maintained-actions)



        ## Feedback

        For bug reports, feature requests, and general feedback; please create an
        issue in [step-security/secure-repo](https://github.com/step-security/secure-repo)
        or contact us via [our website](https://www.stepsecurity.io/).



        '
      change_url: https://github.com/vexxhost/ansible-collection-containers/pull/97
      child_jobs: []
      commit_id: 4ce2e21225812b5496a82b542d7620af96d7ad9e
      event_id: 12f135d0-18ae-11f1-85c2-fd1165a7d91d
      executor:
        hostname: 0a8996d2b663
        inventory_file: /var/lib/zuul/builds/8ff8fb8fc4a54facbcef308982c8ce39/ansible/inventory.yaml
        log_root: /var/lib/zuul/builds/8ff8fb8fc4a54facbcef308982c8ce39/work/logs
        result_data_file: /var/lib/zuul/builds/8ff8fb8fc4a54facbcef308982c8ce39/work/results.json
        src_root: /var/lib/zuul/builds/8ff8fb8fc4a54facbcef308982c8ce39/work/src
        work_root: /var/lib/zuul/builds/8ff8fb8fc4a54facbcef308982c8ce39/work
      include_vars: []
      items:
      - branch: main
        change: '97'
        change_message: '[StepSecurity] Apply security best practices


          ## Summary


          This pull request has been generated by [StepSecurity](https://app.stepsecurity.io/github/vexxhost/actions/dashboard)
          as part of your enterprise subscription to ensure compliance with recommended
          security best practices. Please review and merge the pull request to apply
          these security enhancements.


          ## Security Fixes


          ### Harden Runner


          Harden-Runner is an open-source security agent for the GitHub-hosted runner
          to prevent software supply chain attacks. It prevents exfiltration of credentials,
          detects tampering of source code during build, and enables running jobs
          without sudo access.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#dangerous-workflow)

          ### Least Privileged GitHub Actions Token Permissions


          The GITHUB_TOKEN is an automatically generated secret to make authenticated
          calls to the GitHub API. GitHub recommends setting minimum token permissions
          for the GITHUB_TOKEN.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#using-the-github_token-in-a-workflow)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions)


          ### Pinned Dependencies


          Pinning GitHub Actions to specific versions or commit SHAs ensures that
          your workflows remain consistent and secure.

          Unpinned actions can lead to unexpected changes or vulnerabilities caused
          by upstream updates.


          - [GitHub Security Guide](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)

          - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)

          ### StepSecurity Maintained Actions


          Risky GitHub Actions can expose your project to potential security risks.
          Risky actions have been replaced with StepSecurity maintained actions, that
          are secure drop-in replacements.


          - [StepSecurity Maintained Actions](https://docs.stepsecurity.io/actions/stepsecurity-maintained-actions)



          ## Feedback

          For bug reports, feature requests, and general feedback; please create an
          issue in [step-security/secure-repo](https://github.com/step-security/secure-repo)
          or contact us via [our website](https://www.stepsecurity.io/).



          '
        change_url: https://github.com/vexxhost/ansible-collection-containers/pull/97
        commit_id: 4ce2e21225812b5496a82b542d7620af96d7ad9e
        patchset: 4ce2e21225812b5496a82b542d7620af96d7ad9e
        project:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-containers
          name: vexxhost/ansible-collection-containers
          short_name: ansible-collection-containers
          src_dir: src/github.com/vexxhost/ansible-collection-containers
        topic: null
      job: ansible-collection-containers-molecule-nerdctl-ubuntu-noble
      jobtags: []
      max_attempts: 3
      message: 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
      patchset: 4ce2e21225812b5496a82b542d7620af96d7ad9e
      pipeline: check
      playbook_context:
        playbook_projects:
          trusted/project_0/github.com/vexxhost/zuul-config:
            canonical_name: github.com/vexxhost/zuul-config
            checkout: main
            commit: 9052b5a7781b3346e4cffd452a54448cbff54d8b
          trusted/project_1/opendev.org/zuul/zuul-jobs:
            canonical_name: opendev.org/zuul/zuul-jobs
            checkout: master
            commit: 571c0efa3491d12ecb8fc1169c510716d55c0fc2
          trusted/project_2/github.com/vexxhost/zuul-jobs:
            canonical_name: github.com/vexxhost/zuul-jobs
            checkout: main
            commit: a6e68243e02ef030ce5e75f8b67630880c475f33
          untrusted/project_0/github.com/vexxhost/zuul-jobs:
            canonical_name: github.com/vexxhost/zuul-jobs
            checkout: main
            commit: a6e68243e02ef030ce5e75f8b67630880c475f33
          untrusted/project_1/github.com/vexxhost/zuul-config:
            canonical_name: github.com/vexxhost/zuul-config
            checkout: main
            commit: 9052b5a7781b3346e4cffd452a54448cbff54d8b
          untrusted/project_2/opendev.org/zuul/zuul-jobs:
            canonical_name: opendev.org/zuul/zuul-jobs
            checkout: master
            commit: 571c0efa3491d12ecb8fc1169c510716d55c0fc2
        playbooks:
        - path: untrusted/project_0/github.com/vexxhost/zuul-jobs/playbooks/molecule/run.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/playbook_0/role_1/zuul-jobs
            link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs
            role_path: ansible/playbook_0/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: playbook branch
            link_name: ansible/playbook_0/role_2/zuul-jobs
            link_target: untrusted/project_0/github.com/vexxhost/zuul-jobs
            role_path: ansible/playbook_0/role_2/zuul-jobs/roles
        post_playbooks:
        - path: trusted/project_0/github.com/vexxhost/zuul-config/playbooks/base/post.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/post_playbook_0/role_1/zuul-jobs
            link_target: trusted/project_1/opendev.org/zuul/zuul-jobs
            role_path: ansible/post_playbook_0/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/post_playbook_0/role_2/zuul-jobs
            link_target: trusted/project_2/github.com/vexxhost/zuul-jobs
            role_path: ansible/post_playbook_0/role_2/zuul-jobs/roles
        - path: trusted/project_0/github.com/vexxhost/zuul-config/playbooks/base/post-logs.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/post_playbook_1/role_1/zuul-jobs
            link_target: trusted/project_1/opendev.org/zuul/zuul-jobs
            role_path: ansible/post_playbook_1/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/post_playbook_1/role_2/zuul-jobs
            link_target: trusted/project_2/github.com/vexxhost/zuul-jobs
            role_path: ansible/post_playbook_1/role_2/zuul-jobs/roles
        pre_playbooks:
        - path: trusted/project_0/github.com/vexxhost/zuul-config/playbooks/base/pre.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/pre_playbook_0/role_1/zuul-jobs
            link_target: trusted/project_1/opendev.org/zuul/zuul-jobs
            role_path: ansible/pre_playbook_0/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/pre_playbook_0/role_2/zuul-jobs
            link_target: trusted/project_2/github.com/vexxhost/zuul-jobs
            role_path: ansible/pre_playbook_0/role_2/zuul-jobs/roles
        - path: untrusted/project_0/github.com/vexxhost/zuul-jobs/playbooks/molecule/pre.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/pre_playbook_1/role_1/zuul-jobs
            link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs
            role_path: ansible/pre_playbook_1/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: playbook branch
            link_name: ansible/pre_playbook_1/role_2/zuul-jobs
            link_target: untrusted/project_0/github.com/vexxhost/zuul-jobs
            role_path: ansible/pre_playbook_1/role_2/zuul-jobs/roles
      post_review: false
      post_timeout: null
      pre_timeout: null
      project:
        canonical_hostname: github.com
        canonical_name: github.com/vexxhost/ansible-collection-containers
        name: vexxhost/ansible-collection-containers
        short_name: ansible-collection-containers
        src_dir: src/github.com/vexxhost/ansible-collection-containers
      projects:
        github.com/vexxhost/ansible-collection-containers:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-containers
          checkout: main
          checkout_description: zuul branch
          commit: 1c67e7c8844a9b6bf9fa4392ccb9f501258a56db
          name: vexxhost/ansible-collection-containers
          required: false
          short_name: ansible-collection-containers
          src_dir: src/github.com/vexxhost/ansible-collection-containers
      ref: refs/pull/97/head
      resources: {}
      tenant: oss
      timeout: 1800
      topic: null
      voting: true
