all:
  children:
    zuul_unreachable:
      hosts: {}
  hosts:
    ubuntu-noble:
      ansible_connection: ssh
      ansible_host: 199.204.45.22
      ansible_port: 22
      ansible_python_interpreter: auto
      ansible_user: zuul
      nodepool:
        az: nova
        cloud: public
        external_id: 52c1cdb4-28cd-4203-9b09-0459382dc48f
        host_id: 7b8a4cf3090e32af994f4889a62f1003a5f74592d8295d185d35c3b9
        interface_ip: 199.204.45.22
        label: ubuntu-noble
        node_properties: {}
        private_ipv4: 199.204.45.22
        private_ipv6: null
        provider: yul1
        public_ipv4: 199.204.45.22
        public_ipv6: 2604:e100:1:0:f816:3eff:feb9:2bf0
        region: ca-ymq-1
        slot: null
      zuul_node:
        az: nova
        cloud: public
        external_id: 52c1cdb4-28cd-4203-9b09-0459382dc48f
        host_id: 7b8a4cf3090e32af994f4889a62f1003a5f74592d8295d185d35c3b9
        interface_ip: 199.204.45.22
        label: ubuntu-noble
        node_properties: {}
        private_ipv4: 199.204.45.22
        private_ipv6: null
        provider: yul1
        public_ipv4: 199.204.45.22
        public_ipv6: 2604:e100:1:0:f816:3eff:feb9:2bf0
        region: ca-ymq-1
        slot: null
        uuid: null
  vars:
    zuul:
      _inheritance_path:
      - '<Job base explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/zuul-config/zuul.d/jobs.yaml@main#1>'
      - '<Job ansible-test explicit: None implied: {MatchAny:{ImpliedBranchMatcher:main}}
        source: vexxhost/zuul-jobs/zuul.d/ansible-jobs.yaml@main#8>'
      - '<Job ansible-test explicit: None implied: None source: vexxhost/ansible-collection-ceph/.zuul.yaml@main#99>'
      ansible_version: '9'
      attempts: 1
      branch: main
      build: e5395ed957fa47548ac351aa7b9766bb
      build_refs:
      - branch: main
        change: '96'
        change_message: "chore(deps): update step-security/harden-runner action to
          v2.18.0\n\nThis PR contains the following updates:\n\n| Package | Type |
          Update | Change |\n|---|---|---|---|\n| [step-security/harden-runner](https://redirect.github.com/step-security/harden-runner)
          | action | minor | `v2.15.0` \u2192 `v2.18.0` |\n\n---\n\n### Release Notes\n\n<details>\n<summary>step-security/harden-runner
          (step-security/harden-runner)</summary>\n\n### [`v2.18.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.18.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0)\n\n#####
          What's Changed\n\nGlobal Block List: During supply chain incidents like
          the recent axios and trivy compromises, StepSecurity will add known malicious
          domains and IP addresses (IOCs) to a global block list. These will be automatically
          blocked, even in audit mode, providing immediate protection without requiring
          any workflow changes.\n\nDeploy on Self-Hosted VM: Added `deploy-on-self-hosted-vm`
          input that allows the Harden Runner agent to be installed directly on ephemeral
          self-hosted Linux runner VMs at workflow runtime. This is intended as an
          alternative when baking the agent into the VM image is not possible.\n\n**Full
          Changelog**: <https://github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0>\n\n###
          [`v2.17.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.17.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0)\n\n#####
          What's Changed\n\n##### Policy Store Support\n\nAdded `use-policy-store`
          and `api-key` inputs to fetch security policies directly from the [StepSecurity
          Policy Store](https://docs.stepsecurity.io/harden-runner/policy-store).
          Policies can be defined and attached at the workflow, repo, org, or cluster
          (ARC) level, with the most granular policy taking precedence. This is the
          preferred method over the existing `policy` input which requires `id-token:
          write` permission. If no policy is found in the store, the action defaults
          to audit mode.\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0>\n\n###
          [`v2.16.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.1)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1)\n\n#####
          What's Changed\n\nEnterprise tier: Added support for direct IP addresses
          in the allow list\nCommunity tier: Migrated Harden Runner telemetry to a
          new endpoint\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1>\n\n###
          [`v2.16.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0)\n\n####
          What's Changed\n\n- Updated action.yml to use node24\n- Security fix: Fixed
          a medium severity vulnerability where the egress block policy could be bypassed
          via DNS over HTTPS (DoH) by proxying DNS queries through a permitted resolver,
          allowing data exfiltration even with a restrictive allowed-endpoints list.
          This issue only affects the Community Tier; the Enterprise Tier is not affected.
          See [GHSA-46g3-37rh-v698](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-46g3-37rh-v698)
          for details.\n- Security fix: Fixed a medium severity vulnerability where
          the egress block policy could be bypassed via DNS queries over TCP to external
          resolvers, allowing outbound network communication that evades configured
          network restrictions. This issue only affects the Community Tier; the Enterprise
          Tier is not affected. See [GHSA-g699-3x6g-wm3g](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-g699-3x6g-wm3g)
          for details.\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0>\n\n###
          [`v2.15.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.15.1)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1)\n\n#####
          What's Changed\n\n- Fixes [#&#8203;642](https://redirect.github.com/step-security/harden-runner/issues/642)
          bug due to which post step was failing on Windows ARM runners\n- Updates
          npm packages\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1>\n\n</details>\n\n---\n\n###
          Configuration\n\n\U0001F4C5 **Schedule**: (UTC)\n\n- Branch creation\n  -
          At any time (no schedule defined)\n- Automerge\n  - At any time (no schedule
          defined)\n\n\U0001F6A6 **Automerge**: Disabled by config. Please merge this
          manually once you are satisfied.\n\n\u267B **Rebasing**: Whenever PR becomes
          conflicted, or you tick the rebase/retry checkbox.\n\n\U0001F515 **Ignore**:
          Close this PR and you won't be reminded about this update again.\n\n---\n\n
          - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this
          box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/).
          View the [repository job log](https://developer.mend.io/github/vexxhost/ansible-collection-ceph).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0My41Ni4wIiwidXBkYXRlZEluVmVyIjoiNDMuMTIwLjIiLCJ0YXJnZXRCcmFuY2giOiJtYWluIiwibGFiZWxzIjpbXX0=-->\n"
        change_url: https://github.com/vexxhost/ansible-collection-ceph/pull/96
        commit_id: d705bd6aa1d5c580e734061df83a68334eec8254
        patchset: d705bd6aa1d5c580e734061df83a68334eec8254
        project:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-ceph
          name: vexxhost/ansible-collection-ceph
          short_name: ansible-collection-ceph
          src_dir: src/github.com/vexxhost/ansible-collection-ceph
        src_dir: src/github.com/vexxhost/ansible-collection-ceph
        topic: null
      buildset: 78f60a65489048d6bce85170aca52535
      buildset_refs:
      - branch: main
        change: '96'
        change_message: "chore(deps): update step-security/harden-runner action to
          v2.18.0\n\nThis PR contains the following updates:\n\n| Package | Type |
          Update | Change |\n|---|---|---|---|\n| [step-security/harden-runner](https://redirect.github.com/step-security/harden-runner)
          | action | minor | `v2.15.0` \u2192 `v2.18.0` |\n\n---\n\n### Release Notes\n\n<details>\n<summary>step-security/harden-runner
          (step-security/harden-runner)</summary>\n\n### [`v2.18.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.18.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0)\n\n#####
          What's Changed\n\nGlobal Block List: During supply chain incidents like
          the recent axios and trivy compromises, StepSecurity will add known malicious
          domains and IP addresses (IOCs) to a global block list. These will be automatically
          blocked, even in audit mode, providing immediate protection without requiring
          any workflow changes.\n\nDeploy on Self-Hosted VM: Added `deploy-on-self-hosted-vm`
          input that allows the Harden Runner agent to be installed directly on ephemeral
          self-hosted Linux runner VMs at workflow runtime. This is intended as an
          alternative when baking the agent into the VM image is not possible.\n\n**Full
          Changelog**: <https://github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0>\n\n###
          [`v2.17.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.17.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0)\n\n#####
          What's Changed\n\n##### Policy Store Support\n\nAdded `use-policy-store`
          and `api-key` inputs to fetch security policies directly from the [StepSecurity
          Policy Store](https://docs.stepsecurity.io/harden-runner/policy-store).
          Policies can be defined and attached at the workflow, repo, org, or cluster
          (ARC) level, with the most granular policy taking precedence. This is the
          preferred method over the existing `policy` input which requires `id-token:
          write` permission. If no policy is found in the store, the action defaults
          to audit mode.\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0>\n\n###
          [`v2.16.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.1)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1)\n\n#####
          What's Changed\n\nEnterprise tier: Added support for direct IP addresses
          in the allow list\nCommunity tier: Migrated Harden Runner telemetry to a
          new endpoint\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1>\n\n###
          [`v2.16.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0)\n\n####
          What's Changed\n\n- Updated action.yml to use node24\n- Security fix: Fixed
          a medium severity vulnerability where the egress block policy could be bypassed
          via DNS over HTTPS (DoH) by proxying DNS queries through a permitted resolver,
          allowing data exfiltration even with a restrictive allowed-endpoints list.
          This issue only affects the Community Tier; the Enterprise Tier is not affected.
          See [GHSA-46g3-37rh-v698](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-46g3-37rh-v698)
          for details.\n- Security fix: Fixed a medium severity vulnerability where
          the egress block policy could be bypassed via DNS queries over TCP to external
          resolvers, allowing outbound network communication that evades configured
          network restrictions. This issue only affects the Community Tier; the Enterprise
          Tier is not affected. See [GHSA-g699-3x6g-wm3g](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-g699-3x6g-wm3g)
          for details.\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0>\n\n###
          [`v2.15.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.15.1)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1)\n\n#####
          What's Changed\n\n- Fixes [#&#8203;642](https://redirect.github.com/step-security/harden-runner/issues/642)
          bug due to which post step was failing on Windows ARM runners\n- Updates
          npm packages\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1>\n\n</details>\n\n---\n\n###
          Configuration\n\n\U0001F4C5 **Schedule**: (UTC)\n\n- Branch creation\n  -
          At any time (no schedule defined)\n- Automerge\n  - At any time (no schedule
          defined)\n\n\U0001F6A6 **Automerge**: Disabled by config. Please merge this
          manually once you are satisfied.\n\n\u267B **Rebasing**: Whenever PR becomes
          conflicted, or you tick the rebase/retry checkbox.\n\n\U0001F515 **Ignore**:
          Close this PR and you won't be reminded about this update again.\n\n---\n\n
          - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this
          box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/).
          View the [repository job log](https://developer.mend.io/github/vexxhost/ansible-collection-ceph).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0My41Ni4wIiwidXBkYXRlZEluVmVyIjoiNDMuMTIwLjIiLCJ0YXJnZXRCcmFuY2giOiJtYWluIiwibGFiZWxzIjpbXX0=-->\n"
        change_url: https://github.com/vexxhost/ansible-collection-ceph/pull/96
        commit_id: d705bd6aa1d5c580e734061df83a68334eec8254
        patchset: d705bd6aa1d5c580e734061df83a68334eec8254
        project:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-ceph
          name: vexxhost/ansible-collection-ceph
          short_name: ansible-collection-ceph
          src_dir: src/github.com/vexxhost/ansible-collection-ceph
        src_dir: src/github.com/vexxhost/ansible-collection-ceph
        topic: null
      change: '96'
      change_message: "chore(deps): update step-security/harden-runner action to v2.18.0\n\nThis
        PR contains the following updates:\n\n| Package | Type | Update | Change |\n|---|---|---|---|\n|
        [step-security/harden-runner](https://redirect.github.com/step-security/harden-runner)
        | action | minor | `v2.15.0` \u2192 `v2.18.0` |\n\n---\n\n### Release Notes\n\n<details>\n<summary>step-security/harden-runner
        (step-security/harden-runner)</summary>\n\n### [`v2.18.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.18.0)\n\n[Compare
        Source](https://redirect.github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0)\n\n#####
        What's Changed\n\nGlobal Block List: During supply chain incidents like the
        recent axios and trivy compromises, StepSecurity will add known malicious
        domains and IP addresses (IOCs) to a global block list. These will be automatically
        blocked, even in audit mode, providing immediate protection without requiring
        any workflow changes.\n\nDeploy on Self-Hosted VM: Added `deploy-on-self-hosted-vm`
        input that allows the Harden Runner agent to be installed directly on ephemeral
        self-hosted Linux runner VMs at workflow runtime. This is intended as an alternative
        when baking the agent into the VM image is not possible.\n\n**Full Changelog**:
        <https://github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0>\n\n###
        [`v2.17.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.17.0)\n\n[Compare
        Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0)\n\n#####
        What's Changed\n\n##### Policy Store Support\n\nAdded `use-policy-store` and
        `api-key` inputs to fetch security policies directly from the [StepSecurity
        Policy Store](https://docs.stepsecurity.io/harden-runner/policy-store). Policies
        can be defined and attached at the workflow, repo, org, or cluster (ARC) level,
        with the most granular policy taking precedence. This is the preferred method
        over the existing `policy` input which requires `id-token: write` permission.
        If no policy is found in the store, the action defaults to audit mode.\n\n**Full
        Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0>\n\n###
        [`v2.16.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.1)\n\n[Compare
        Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1)\n\n#####
        What's Changed\n\nEnterprise tier: Added support for direct IP addresses in
        the allow list\nCommunity tier: Migrated Harden Runner telemetry to a new
        endpoint\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1>\n\n###
        [`v2.16.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.0)\n\n[Compare
        Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0)\n\n####
        What's Changed\n\n- Updated action.yml to use node24\n- Security fix: Fixed
        a medium severity vulnerability where the egress block policy could be bypassed
        via DNS over HTTPS (DoH) by proxying DNS queries through a permitted resolver,
        allowing data exfiltration even with a restrictive allowed-endpoints list.
        This issue only affects the Community Tier; the Enterprise Tier is not affected.
        See [GHSA-46g3-37rh-v698](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-46g3-37rh-v698)
        for details.\n- Security fix: Fixed a medium severity vulnerability where
        the egress block policy could be bypassed via DNS queries over TCP to external
        resolvers, allowing outbound network communication that evades configured
        network restrictions. This issue only affects the Community Tier; the Enterprise
        Tier is not affected. See [GHSA-g699-3x6g-wm3g](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-g699-3x6g-wm3g)
        for details.\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0>\n\n###
        [`v2.15.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.15.1)\n\n[Compare
        Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1)\n\n#####
        What's Changed\n\n- Fixes [#&#8203;642](https://redirect.github.com/step-security/harden-runner/issues/642)
        bug due to which post step was failing on Windows ARM runners\n- Updates npm
        packages\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1>\n\n</details>\n\n---\n\n###
        Configuration\n\n\U0001F4C5 **Schedule**: (UTC)\n\n- Branch creation\n  -
        At any time (no schedule defined)\n- Automerge\n  - At any time (no schedule
        defined)\n\n\U0001F6A6 **Automerge**: Disabled by config. Please merge this
        manually once you are satisfied.\n\n\u267B **Rebasing**: Whenever PR becomes
        conflicted, or you tick the rebase/retry checkbox.\n\n\U0001F515 **Ignore**:
        Close this PR and you won't be reminded about this update again.\n\n---\n\n
        - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this
        box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/).
        View the [repository job log](https://developer.mend.io/github/vexxhost/ansible-collection-ceph).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0My41Ni4wIiwidXBkYXRlZEluVmVyIjoiNDMuMTIwLjIiLCJ0YXJnZXRCcmFuY2giOiJtYWluIiwibGFiZWxzIjpbXX0=-->\n"
      change_url: https://github.com/vexxhost/ansible-collection-ceph/pull/96
      child_jobs: []
      commit_id: d705bd6aa1d5c580e734061df83a68334eec8254
      event_id: 84badde0-38ae-11f1-8e11-15ac2b02dee5
      executor:
        hostname: 0a8996d2b663
        inventory_file: /var/lib/zuul/builds/e5395ed957fa47548ac351aa7b9766bb/ansible/inventory.yaml
        log_root: /var/lib/zuul/builds/e5395ed957fa47548ac351aa7b9766bb/work/logs
        result_data_file: /var/lib/zuul/builds/e5395ed957fa47548ac351aa7b9766bb/work/results.json
        src_root: /var/lib/zuul/builds/e5395ed957fa47548ac351aa7b9766bb/work/src
        work_root: /var/lib/zuul/builds/e5395ed957fa47548ac351aa7b9766bb/work
      include_vars: []
      items:
      - branch: main
        change: '96'
        change_message: "chore(deps): update step-security/harden-runner action to
          v2.18.0\n\nThis PR contains the following updates:\n\n| Package | Type |
          Update | Change |\n|---|---|---|---|\n| [step-security/harden-runner](https://redirect.github.com/step-security/harden-runner)
          | action | minor | `v2.15.0` \u2192 `v2.18.0` |\n\n---\n\n### Release Notes\n\n<details>\n<summary>step-security/harden-runner
          (step-security/harden-runner)</summary>\n\n### [`v2.18.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.18.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0)\n\n#####
          What's Changed\n\nGlobal Block List: During supply chain incidents like
          the recent axios and trivy compromises, StepSecurity will add known malicious
          domains and IP addresses (IOCs) to a global block list. These will be automatically
          blocked, even in audit mode, providing immediate protection without requiring
          any workflow changes.\n\nDeploy on Self-Hosted VM: Added `deploy-on-self-hosted-vm`
          input that allows the Harden Runner agent to be installed directly on ephemeral
          self-hosted Linux runner VMs at workflow runtime. This is intended as an
          alternative when baking the agent into the VM image is not possible.\n\n**Full
          Changelog**: <https://github.com/step-security/harden-runner/compare/v2.17.0...v2.18.0>\n\n###
          [`v2.17.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.17.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0)\n\n#####
          What's Changed\n\n##### Policy Store Support\n\nAdded `use-policy-store`
          and `api-key` inputs to fetch security policies directly from the [StepSecurity
          Policy Store](https://docs.stepsecurity.io/harden-runner/policy-store).
          Policies can be defined and attached at the workflow, repo, org, or cluster
          (ARC) level, with the most granular policy taking precedence. This is the
          preferred method over the existing `policy` input which requires `id-token:
          write` permission. If no policy is found in the store, the action defaults
          to audit mode.\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.1...v2.17.0>\n\n###
          [`v2.16.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.1)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1)\n\n#####
          What's Changed\n\nEnterprise tier: Added support for direct IP addresses
          in the allow list\nCommunity tier: Migrated Harden Runner telemetry to a
          new endpoint\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.16.0...v2.16.1>\n\n###
          [`v2.16.0`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.16.0)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0)\n\n####
          What's Changed\n\n- Updated action.yml to use node24\n- Security fix: Fixed
          a medium severity vulnerability where the egress block policy could be bypassed
          via DNS over HTTPS (DoH) by proxying DNS queries through a permitted resolver,
          allowing data exfiltration even with a restrictive allowed-endpoints list.
          This issue only affects the Community Tier; the Enterprise Tier is not affected.
          See [GHSA-46g3-37rh-v698](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-46g3-37rh-v698)
          for details.\n- Security fix: Fixed a medium severity vulnerability where
          the egress block policy could be bypassed via DNS queries over TCP to external
          resolvers, allowing outbound network communication that evades configured
          network restrictions. This issue only affects the Community Tier; the Enterprise
          Tier is not affected. See [GHSA-g699-3x6g-wm3g](https://redirect.github.com/step-security/harden-runner/security/advisories/GHSA-g699-3x6g-wm3g)
          for details.\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.1...v2.16.0>\n\n###
          [`v2.15.1`](https://redirect.github.com/step-security/harden-runner/releases/tag/v2.15.1)\n\n[Compare
          Source](https://redirect.github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1)\n\n#####
          What's Changed\n\n- Fixes [#&#8203;642](https://redirect.github.com/step-security/harden-runner/issues/642)
          bug due to which post step was failing on Windows ARM runners\n- Updates
          npm packages\n\n**Full Changelog**: <https://github.com/step-security/harden-runner/compare/v2.15.0...v2.15.1>\n\n</details>\n\n---\n\n###
          Configuration\n\n\U0001F4C5 **Schedule**: (UTC)\n\n- Branch creation\n  -
          At any time (no schedule defined)\n- Automerge\n  - At any time (no schedule
          defined)\n\n\U0001F6A6 **Automerge**: Disabled by config. Please merge this
          manually once you are satisfied.\n\n\u267B **Rebasing**: Whenever PR becomes
          conflicted, or you tick the rebase/retry checkbox.\n\n\U0001F515 **Ignore**:
          Close this PR and you won't be reminded about this update again.\n\n---\n\n
          - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this
          box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/).
          View the [repository job log](https://developer.mend.io/github/vexxhost/ansible-collection-ceph).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0My41Ni4wIiwidXBkYXRlZEluVmVyIjoiNDMuMTIwLjIiLCJ0YXJnZXRCcmFuY2giOiJtYWluIiwibGFiZWxzIjpbXX0=-->\n"
        change_url: https://github.com/vexxhost/ansible-collection-ceph/pull/96
        commit_id: d705bd6aa1d5c580e734061df83a68334eec8254
        patchset: d705bd6aa1d5c580e734061df83a68334eec8254
        project:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-ceph
          name: vexxhost/ansible-collection-ceph
          short_name: ansible-collection-ceph
          src_dir: src/github.com/vexxhost/ansible-collection-ceph
        topic: null
      job: ansible-test
      jobtags: []
      max_attempts: 3
      message: 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
      patchset: d705bd6aa1d5c580e734061df83a68334eec8254
      pipeline: check
      playbook_context:
        playbook_projects:
          trusted/project_0/github.com/vexxhost/zuul-config:
            canonical_name: github.com/vexxhost/zuul-config
            checkout: main
            commit: 298983cd1253e6833abdb49d87d912527e0e6597
          trusted/project_1/opendev.org/zuul/zuul-jobs:
            canonical_name: opendev.org/zuul/zuul-jobs
            checkout: master
            commit: fc4af6d44718d2e648cf6396f3e96bb46a55117a
          trusted/project_2/github.com/vexxhost/zuul-jobs:
            canonical_name: github.com/vexxhost/zuul-jobs
            checkout: main
            commit: a6e68243e02ef030ce5e75f8b67630880c475f33
          untrusted/project_0/github.com/vexxhost/zuul-jobs:
            canonical_name: github.com/vexxhost/zuul-jobs
            checkout: main
            commit: a6e68243e02ef030ce5e75f8b67630880c475f33
          untrusted/project_1/github.com/vexxhost/zuul-config:
            canonical_name: github.com/vexxhost/zuul-config
            checkout: main
            commit: 298983cd1253e6833abdb49d87d912527e0e6597
          untrusted/project_2/opendev.org/zuul/zuul-jobs:
            canonical_name: opendev.org/zuul/zuul-jobs
            checkout: master
            commit: fc4af6d44718d2e648cf6396f3e96bb46a55117a
        playbooks:
        - path: untrusted/project_0/github.com/vexxhost/zuul-jobs/playbooks/ansible-test/run.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/playbook_0/role_1/zuul-jobs
            link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs
            role_path: ansible/playbook_0/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: playbook branch
            link_name: ansible/playbook_0/role_2/zuul-jobs
            link_target: untrusted/project_0/github.com/vexxhost/zuul-jobs
            role_path: ansible/playbook_0/role_2/zuul-jobs/roles
        post_playbooks:
        - path: trusted/project_0/github.com/vexxhost/zuul-config/playbooks/base/post.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/post_playbook_0/role_1/zuul-jobs
            link_target: trusted/project_1/opendev.org/zuul/zuul-jobs
            role_path: ansible/post_playbook_0/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/post_playbook_0/role_2/zuul-jobs
            link_target: trusted/project_2/github.com/vexxhost/zuul-jobs
            role_path: ansible/post_playbook_0/role_2/zuul-jobs/roles
        - path: trusted/project_0/github.com/vexxhost/zuul-config/playbooks/base/post-logs.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/post_playbook_1/role_1/zuul-jobs
            link_target: trusted/project_1/opendev.org/zuul/zuul-jobs
            role_path: ansible/post_playbook_1/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/post_playbook_1/role_2/zuul-jobs
            link_target: trusted/project_2/github.com/vexxhost/zuul-jobs
            role_path: ansible/post_playbook_1/role_2/zuul-jobs/roles
        pre_playbooks:
        - path: trusted/project_0/github.com/vexxhost/zuul-config/playbooks/base/pre.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/pre_playbook_0/role_1/zuul-jobs
            link_target: trusted/project_1/opendev.org/zuul/zuul-jobs
            role_path: ansible/pre_playbook_0/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: zuul branch
            link_name: ansible/pre_playbook_0/role_2/zuul-jobs
            link_target: trusted/project_2/github.com/vexxhost/zuul-jobs
            role_path: ansible/pre_playbook_0/role_2/zuul-jobs/roles
        - path: untrusted/project_0/github.com/vexxhost/zuul-jobs/playbooks/ansible-test/pre.yaml
          roles:
          - checkout: master
            checkout_description: project default branch
            link_name: ansible/pre_playbook_1/role_1/zuul-jobs
            link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs
            role_path: ansible/pre_playbook_1/role_1/zuul-jobs/roles
          - checkout: main
            checkout_description: playbook branch
            link_name: ansible/pre_playbook_1/role_2/zuul-jobs
            link_target: untrusted/project_0/github.com/vexxhost/zuul-jobs
            role_path: ansible/pre_playbook_1/role_2/zuul-jobs/roles
      post_review: false
      post_timeout: null
      pre_timeout: null
      project:
        canonical_hostname: github.com
        canonical_name: github.com/vexxhost/ansible-collection-ceph
        name: vexxhost/ansible-collection-ceph
        short_name: ansible-collection-ceph
        src_dir: src/github.com/vexxhost/ansible-collection-ceph
      projects:
        github.com/vexxhost/ansible-collection-ceph:
          canonical_hostname: github.com
          canonical_name: github.com/vexxhost/ansible-collection-ceph
          checkout: main
          checkout_description: zuul branch
          commit: 7f8f1ef9d77bda6cf6dbee158e19842414662fa9
          name: vexxhost/ansible-collection-ceph
          required: false
          short_name: ansible-collection-ceph
          src_dir: src/github.com/vexxhost/ansible-collection-ceph
      ref: refs/pull/96/head
      resources: {}
      tenant: oss
      timeout: 1800
      topic: null
      voting: true
