all: children: zuul_unreachable: hosts: {} hosts: controller: ansible_connection: kubectl ansible_host: zuul-worker-ansible-0005638983 ansible_kubectl_context: main:zuul-worker/38-129-16-117:9023 ansible_port: null ansible_python_interpreter: /bin/python3 ansible_ssh_common_args: -o StrictHostKeyChecking=false ansible_user: zuul nodepool: az: null cloud: /sf-container-worker-1/ external_id: main-zuul-worker-ansible-0005638983 host_id: null interface_ip: zuul-worker-ansible-0005638983 label: zuul-worker-ansible private_ipv4: null private_ipv6: null provider: sf-container-worker-1 public_ipv4: null public_ipv6: null region: null slot: null zuul_use_fetch_output: true vars: zuul: _inheritance_path: - '' - '' - '' - '' - '' ansible_version: '8' attempts: 1 branch: stable-10 build: e5714f3013e44c55b5be58aad06f8311 build_refs: - branch: stable-10 change: '2885' change_message: "[PR #2884/63ca7e10 backport][stable-10] Fix ReDoS vulnerabilities in regex patterns\n\n**This is a backport of PR #2884 as merged into main (63ca7e103003319140de27cbc8b86ddf783f190c).**\n\n##### SUMMARY\nFix potential Regular Expression Denial of Service (ReDoS) vulnerabilities in regex patterns identified by SonarCloud static analysis.\n\nThese issues were identified by SonarCloud: https://sonarcloud.io/project/security_hotspots?id=ansible-collections_amazon.aws&hotspots=AZx2vqnXBuzFI9Zt1OtN\n\n##### ISSUE TYPE\n- Bugfix Pull Request\n\n##### COMPONENT NAME\n- arn (module_utils)\n- ec2_security_group (module)\n\n##### ADDITIONAL INFORMATION\n\n**Changes made:**\n\n1. **`plugins/module_utils/arn.py` (line 60)**\n - Changed: `r\"^(.*?)[:/](.+)$\"` \n - To: `r\"^([^:/]*)[:/](.+)$\"`\n - Using a negated character class `[^:/]*` instead of non-greedy wildcard `.*?` makes character matching mutually exclusive, eliminating the possibility of catastrophic backtracking.\n\n2. **`plugins/modules/ec2_security_group.py` (line 773)**\n - Changed: `r\"^([^/]+)/?(sg-\\S+)?/(\\S+)\"`\n - To: `r\"^([^/]+)/?(sg-[^/]+)?/([^/]+)$\"`\n - Replaced `\\S+` with `[^/]+` to ensure slashes cannot appear in capture groups\n - Added `$` end anchor to ensure pattern completeness\n - Both changes prevent backtracking while maintaining support for 2-part (`amazon-elb/amazon-elb-sg`) and 3-part (`owner/sg-id/name`) formats\n\n**Testing:**\n- All existing unit tests pass (1811 tests)\n- Both regex patterns are extensively covered by existing unit tests\n- Behavior is functionally identical to the original patterns\n\nAssisted-by: Claude Sonnet 4.5 " change_url: https://github.com/ansible-collections/amazon.aws/pull/2885 commit_id: 67fc6e72cb1fa80e6289d81bc21dd3855923f013 patchset: 67fc6e72cb1fa80e6289d81bc21dd3855923f013 project: canonical_hostname: github.com canonical_name: github.com/ansible-collections/amazon.aws name: ansible-collections/amazon.aws short_name: amazon.aws src_dir: src/github.com/ansible-collections/amazon.aws topic: null buildset: 88b6d6b4238d4fc4addb69d597707e24 buildset_refs: - branch: stable-10 change: '2885' change_message: "[PR #2884/63ca7e10 backport][stable-10] Fix ReDoS vulnerabilities in regex patterns\n\n**This is a backport of PR #2884 as merged into main (63ca7e103003319140de27cbc8b86ddf783f190c).**\n\n##### SUMMARY\nFix potential Regular Expression Denial of Service (ReDoS) vulnerabilities in regex patterns identified by SonarCloud static analysis.\n\nThese issues were identified by SonarCloud: https://sonarcloud.io/project/security_hotspots?id=ansible-collections_amazon.aws&hotspots=AZx2vqnXBuzFI9Zt1OtN\n\n##### ISSUE TYPE\n- Bugfix Pull Request\n\n##### COMPONENT NAME\n- arn (module_utils)\n- ec2_security_group (module)\n\n##### ADDITIONAL INFORMATION\n\n**Changes made:**\n\n1. **`plugins/module_utils/arn.py` (line 60)**\n - Changed: `r\"^(.*?)[:/](.+)$\"` \n - To: `r\"^([^:/]*)[:/](.+)$\"`\n - Using a negated character class `[^:/]*` instead of non-greedy wildcard `.*?` makes character matching mutually exclusive, eliminating the possibility of catastrophic backtracking.\n\n2. **`plugins/modules/ec2_security_group.py` (line 773)**\n - Changed: `r\"^([^/]+)/?(sg-\\S+)?/(\\S+)\"`\n - To: `r\"^([^/]+)/?(sg-[^/]+)?/([^/]+)$\"`\n - Replaced `\\S+` with `[^/]+` to ensure slashes cannot appear in capture groups\n - Added `$` end anchor to ensure pattern completeness\n - Both changes prevent backtracking while maintaining support for 2-part (`amazon-elb/amazon-elb-sg`) and 3-part (`owner/sg-id/name`) formats\n\n**Testing:**\n- All existing unit tests pass (1811 tests)\n- Both regex patterns are extensively covered by existing unit tests\n- Behavior is functionally identical to the original patterns\n\nAssisted-by: Claude Sonnet 4.5 " change_url: https://github.com/ansible-collections/amazon.aws/pull/2885 commit_id: 67fc6e72cb1fa80e6289d81bc21dd3855923f013 patchset: 67fc6e72cb1fa80e6289d81bc21dd3855923f013 project: canonical_hostname: github.com canonical_name: github.com/ansible-collections/amazon.aws name: ansible-collections/amazon.aws short_name: amazon.aws src_dir: src/github.com/ansible-collections/amazon.aws topic: null change: '2885' change_message: "[PR #2884/63ca7e10 backport][stable-10] Fix ReDoS vulnerabilities in regex patterns\n\n**This is a backport of PR #2884 as merged into main (63ca7e103003319140de27cbc8b86ddf783f190c).**\n\n##### SUMMARY\nFix potential Regular Expression Denial of Service (ReDoS) vulnerabilities in regex patterns identified by SonarCloud static analysis.\n\nThese issues were identified by SonarCloud: https://sonarcloud.io/project/security_hotspots?id=ansible-collections_amazon.aws&hotspots=AZx2vqnXBuzFI9Zt1OtN\n\n##### ISSUE TYPE\n- Bugfix Pull Request\n\n##### COMPONENT NAME\n- arn (module_utils)\n- ec2_security_group (module)\n\n##### ADDITIONAL INFORMATION\n\n**Changes made:**\n\n1. **`plugins/module_utils/arn.py` (line 60)**\n - Changed: `r\"^(.*?)[:/](.+)$\"` \n - To: `r\"^([^:/]*)[:/](.+)$\"`\n - Using a negated character class `[^:/]*` instead of non-greedy wildcard `.*?` makes character matching mutually exclusive, eliminating the possibility of catastrophic backtracking.\n\n2. **`plugins/modules/ec2_security_group.py` (line 773)**\n - Changed: `r\"^([^/]+)/?(sg-\\S+)?/(\\S+)\"`\n \ - To: `r\"^([^/]+)/?(sg-[^/]+)?/([^/]+)$\"`\n - Replaced `\\S+` with `[^/]+` to ensure slashes cannot appear in capture groups\n - Added `$` end anchor to ensure pattern completeness\n - Both changes prevent backtracking while maintaining support for 2-part (`amazon-elb/amazon-elb-sg`) and 3-part (`owner/sg-id/name`) formats\n\n**Testing:**\n- All existing unit tests pass (1811 tests)\n- Both regex patterns are extensively covered by existing unit tests\n- Behavior is functionally identical to the original patterns\n\nAssisted-by: Claude Sonnet 4.5 " change_url: https://github.com/ansible-collections/amazon.aws/pull/2885 child_jobs: - ansible-galaxy-importer - integration-amazon.aws-1 - integration-amazon.aws-2 - integration-amazon.aws-3 - integration-amazon.aws-4 - integration-amazon.aws-5 - integration-amazon.aws-6 - integration-amazon.aws-7 - integration-amazon.aws-8 - integration-amazon.aws-9 - integration-amazon.aws-10 - integration-amazon.aws-11 - integration-amazon.aws-12 - integration-amazon.aws-13 - integration-amazon.aws-14 - integration-amazon.aws-15 - integration-amazon.aws-16 - integration-amazon.aws-17 - integration-amazon.aws-18 - integration-amazon.aws-19 - integration-amazon.aws-20 - integration-amazon.aws-21 - integration-amazon.aws-22 - integration-community.aws-1 - integration-community.aws-2 - integration-community.aws-3 - integration-community.aws-4 - integration-community.aws-5 - integration-community.aws-6 - integration-community.aws-7 - integration-community.aws-8 - integration-community.aws-9 - integration-community.aws-10 - integration-community.aws-11 - integration-community.aws-12 - integration-community.aws-13 - integration-community.aws-14 - integration-community.aws-15 - integration-community.aws-16 - integration-community.aws-17 - integration-community.aws-18 - integration-community.aws-19 - integration-community.aws-20 - integration-community.aws-21 - integration-community.aws-22 commit_id: 67fc6e72cb1fa80e6289d81bc21dd3855923f013 event_id: 47455402-18ad-11f1-81ba-806aa099ec97 executor: hostname: ze03.softwarefactory-project.io inventory_file: /var/lib/zuul/builds/e5714f3013e44c55b5be58aad06f8311/ansible/inventory.yaml log_root: /var/lib/zuul/builds/e5714f3013e44c55b5be58aad06f8311/work/logs result_data_file: /var/lib/zuul/builds/e5714f3013e44c55b5be58aad06f8311/work/results.json src_root: /var/lib/zuul/builds/e5714f3013e44c55b5be58aad06f8311/work/src work_root: /var/lib/zuul/builds/e5714f3013e44c55b5be58aad06f8311/work items: - branch: main change: '2877' change_message: "Fix `label-new-prs.yml` workflow security issue\n\n##### SUMMARY\r\n\r\nFixing a security issue reported in [SonarQube](https://sonarcloud.io/project/overview?id=ansible-collections_amazon.aws):\r\n\r\n> Using `github.actor` or equivalent properties to check if the actor is a trusted principal on events like `pull_request_target` could be a security issue, because they do not always refer to the actual creator of the `commit` or the `pull request`.\r\n> \r\n> The value represents the entity who triggered the workflow event, which may differ from the actual author of the commit or pull request. If a threat actor could force a trusted actor (such as a bot) into making a change that triggers the workflow, they can bypass the check.\r\n> \r\n> #### What is the potential impact?\r\n> Unauthorized access\r\n> An attacker could trick the action to run sensitive jobs/commands with special permissions or secrets. For instance, an auto-merge workflow.\r\n> \r\n> #### Supply Chain Compromise\r\n> If the sensitive code performs a merge or releases an artifact, an attacker can inject malicious code or publish malicious packages, potentially compromising the entire supply chain.\r\n> \r\n> ### Resources\r\n>\r\n> #### Documentation\r\n>\r\n> GitHub Docs - [GitHub Context reference](https://docs.github.com/en/actions/reference/workflows-and-actions/contexts#github-context)\r\n> GitHub Security Lab - [Keeping your GitHub Actions and workflows secure Part 4: New vulnerability patterns and mitigation strategies](https://securitylab.github.com/resources/github-actions-new-patterns-and-mitigations/)\r\n> \r\n> " change_url: https://github.com/ansible-collections/amazon.aws/pull/2877 commit_id: 717a42f33223cb0e7e4346f5bd9a64532bf5539e patchset: 717a42f33223cb0e7e4346f5bd9a64532bf5539e project: canonical_hostname: github.com canonical_name: github.com/ansible-collections/amazon.aws name: ansible-collections/amazon.aws short_name: amazon.aws src_dir: src/github.com/ansible-collections/amazon.aws topic: null - branch: stable-11 change: '2883' change_message: '[PR #2882/39a1c66b backport][stable-11] Remove redundant list() call in aws_resource_actions callback **This is a backport of PR #2882 as merged into main (39a1c66b66cc06e84193b5fc2524e5c61820db2d).** ##### SUMMARY Remove redundant `list()` call in the aws_resource_actions callback plugin. The `sorted()` function already returns a list, so explicitly wrapping the generator expression in `list()` is unnecessary and less efficient. This change was identified by SonarCloud static analysis: https://sonarcloud.io/project/issues?open=AZx2vrofBuzFI9Zt1PS9&id=ansible-collections_amazon.aws Also adds unit tests for the callback plugin. ##### ISSUE TYPE - Bugfix Pull Request ##### COMPONENT NAME aws_resource_actions (callback plugin) ##### ADDITIONAL INFORMATION SonarCloud identified that the `sorted()` function consumes iterables directly and returns a list, making the explicit `list()` conversion redundant. By removing it, we allow `sorted()` to consume the generator expression more efficiently. **Before:** ```python sorted(list(to_native(action) for action in set(self.aws_resource_actions))) ``` **After:** ```python sorted(to_native(action) for action in set(self.aws_resource_actions)) ``` The unit tests cover all callback methods and various scenarios including playbook completion, duplicate handling, and integration workflows. Assisted-by: Claude Sonnet 4.5 ' change_url: https://github.com/ansible-collections/amazon.aws/pull/2883 commit_id: 1d95ef810e8c2da7799cdd369c432dfedd36f187 patchset: 1d95ef810e8c2da7799cdd369c432dfedd36f187 project: canonical_hostname: github.com canonical_name: github.com/ansible-collections/amazon.aws name: ansible-collections/amazon.aws short_name: amazon.aws src_dir: src/github.com/ansible-collections/amazon.aws topic: null - branch: stable-11 change: '2886' change_message: "[PR #2884/63ca7e10 backport][stable-11] Fix ReDoS vulnerabilities in regex patterns\n\n**This is a backport of PR #2884 as merged into main (63ca7e103003319140de27cbc8b86ddf783f190c).**\n\n##### SUMMARY\nFix potential Regular Expression Denial of Service (ReDoS) vulnerabilities in regex patterns identified by SonarCloud static analysis.\n\nThese issues were identified by SonarCloud: https://sonarcloud.io/project/security_hotspots?id=ansible-collections_amazon.aws&hotspots=AZx2vqnXBuzFI9Zt1OtN\n\n##### ISSUE TYPE\n- Bugfix Pull Request\n\n##### COMPONENT NAME\n- arn (module_utils)\n- ec2_security_group (module)\n\n##### ADDITIONAL INFORMATION\n\n**Changes made:**\n\n1. **`plugins/module_utils/arn.py` (line 60)**\n - Changed: `r\"^(.*?)[:/](.+)$\"` \n - To: `r\"^([^:/]*)[:/](.+)$\"`\n - Using a negated character class `[^:/]*` instead of non-greedy wildcard `.*?` makes character matching mutually exclusive, eliminating the possibility of catastrophic backtracking.\n\n2. **`plugins/modules/ec2_security_group.py` (line 773)**\n - Changed: `r\"^([^/]+)/?(sg-\\S+)?/(\\S+)\"`\n - To: `r\"^([^/]+)/?(sg-[^/]+)?/([^/]+)$\"`\n - Replaced `\\S+` with `[^/]+` to ensure slashes cannot appear in capture groups\n - Added `$` end anchor to ensure pattern completeness\n - Both changes prevent backtracking while maintaining support for 2-part (`amazon-elb/amazon-elb-sg`) and 3-part (`owner/sg-id/name`) formats\n\n**Testing:**\n- All existing unit tests pass (1811 tests)\n- Both regex patterns are extensively covered by existing unit tests\n- Behavior is functionally identical to the original patterns\n\nAssisted-by: Claude Sonnet 4.5 " change_url: https://github.com/ansible-collections/amazon.aws/pull/2886 commit_id: 60f5c0dcacfc9ad93c3f248879a10c37bf22941b patchset: 60f5c0dcacfc9ad93c3f248879a10c37bf22941b project: canonical_hostname: github.com canonical_name: github.com/ansible-collections/amazon.aws name: ansible-collections/amazon.aws short_name: amazon.aws src_dir: src/github.com/ansible-collections/amazon.aws topic: null - branch: stable-10 change: '2885' change_message: "[PR #2884/63ca7e10 backport][stable-10] Fix ReDoS vulnerabilities in regex patterns\n\n**This is a backport of PR #2884 as merged into main (63ca7e103003319140de27cbc8b86ddf783f190c).**\n\n##### SUMMARY\nFix potential Regular Expression Denial of Service (ReDoS) vulnerabilities in regex patterns identified by SonarCloud static analysis.\n\nThese issues were identified by SonarCloud: https://sonarcloud.io/project/security_hotspots?id=ansible-collections_amazon.aws&hotspots=AZx2vqnXBuzFI9Zt1OtN\n\n##### ISSUE TYPE\n- Bugfix Pull Request\n\n##### COMPONENT NAME\n- arn (module_utils)\n- ec2_security_group (module)\n\n##### ADDITIONAL INFORMATION\n\n**Changes made:**\n\n1. **`plugins/module_utils/arn.py` (line 60)**\n - Changed: `r\"^(.*?)[:/](.+)$\"` \n - To: `r\"^([^:/]*)[:/](.+)$\"`\n - Using a negated character class `[^:/]*` instead of non-greedy wildcard `.*?` makes character matching mutually exclusive, eliminating the possibility of catastrophic backtracking.\n\n2. **`plugins/modules/ec2_security_group.py` (line 773)**\n - Changed: `r\"^([^/]+)/?(sg-\\S+)?/(\\S+)\"`\n - To: `r\"^([^/]+)/?(sg-[^/]+)?/([^/]+)$\"`\n - Replaced `\\S+` with `[^/]+` to ensure slashes cannot appear in capture groups\n - Added `$` end anchor to ensure pattern completeness\n - Both changes prevent backtracking while maintaining support for 2-part (`amazon-elb/amazon-elb-sg`) and 3-part (`owner/sg-id/name`) formats\n\n**Testing:**\n- All existing unit tests pass (1811 tests)\n- Both regex patterns are extensively covered by existing unit tests\n- Behavior is functionally identical to the original patterns\n\nAssisted-by: Claude Sonnet 4.5 " change_url: https://github.com/ansible-collections/amazon.aws/pull/2885 commit_id: 67fc6e72cb1fa80e6289d81bc21dd3855923f013 patchset: 67fc6e72cb1fa80e6289d81bc21dd3855923f013 project: canonical_hostname: github.com canonical_name: github.com/ansible-collections/amazon.aws name: ansible-collections/amazon.aws short_name: amazon.aws src_dir: src/github.com/ansible-collections/amazon.aws topic: null job: build-ansible-collection jobtags: [] max_attempts: 3 message: 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 patchset: 67fc6e72cb1fa80e6289d81bc21dd3855923f013 pipeline: gate playbook_context: playbook_projects: trusted/project_0/github.com/ansible/zuul-config: canonical_name: github.com/ansible/zuul-config checkout: master commit: daaa6e3e88f621d4535036fa4292542ebc805ae2 trusted/project_1/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 571c0efa3491d12ecb8fc1169c510716d55c0fc2 untrusted/project_0/github.com/ansible/ansible-zuul-jobs: canonical_name: github.com/ansible/ansible-zuul-jobs checkout: master commit: 192320b9d41936ac6065fcaf6e286bf4dca783a5 untrusted/project_1/github.com/ansible/zuul-config: canonical_name: github.com/ansible/zuul-config checkout: master commit: daaa6e3e88f621d4535036fa4292542ebc805ae2 untrusted/project_2/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 571c0efa3491d12ecb8fc1169c510716d55c0fc2 playbooks: - path: untrusted/project_0/github.com/ansible/ansible-zuul-jobs/playbooks/build-ansible-collection/run.yaml roles: - checkout: master checkout_description: playbook branch link_name: ansible/playbook_0/role_0/zuul-jobs link_target: untrusted/project_0/github.com/ansible/ansible-zuul-jobs role_path: ansible/playbook_0/role_0/zuul-jobs/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_1/zuul-config link_target: untrusted/project_1/github.com/ansible/zuul-config role_path: ansible/playbook_0/role_1/zuul-config/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_2/zuul-jobs link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs role_path: ansible/playbook_0/role_2/zuul-jobs/roles post_review: false project: canonical_hostname: github.com canonical_name: github.com/ansible-collections/amazon.aws name: ansible-collections/amazon.aws short_name: amazon.aws src_dir: src/github.com/ansible-collections/amazon.aws projects: github.com/ansible-collections/amazon.aws: canonical_hostname: github.com canonical_name: github.com/ansible-collections/amazon.aws checkout: stable-10 checkout_description: zuul branch commit: 8466e22039da4c11737d047325d732b3f7072011 name: ansible-collections/amazon.aws required: true short_name: amazon.aws src_dir: src/github.com/ansible-collections/amazon.aws github.com/ansible-collections/ansible.netcommon: canonical_hostname: github.com canonical_name: github.com/ansible-collections/ansible.netcommon checkout: main checkout_description: project default branch commit: 0d1b66f9cbe9a911bf28bd8a3b79192a82425233 name: ansible-collections/ansible.netcommon required: true short_name: ansible.netcommon src_dir: src/github.com/ansible-collections/ansible.netcommon github.com/ansible-collections/ansible.utils: canonical_hostname: github.com canonical_name: github.com/ansible-collections/ansible.utils checkout: main checkout_description: project default branch commit: c5cf7756bab4d1359c943c07083fb30fddffc2bb name: ansible-collections/ansible.utils required: true short_name: ansible.utils src_dir: src/github.com/ansible-collections/ansible.utils github.com/ansible-collections/ansible.windows: canonical_hostname: github.com canonical_name: github.com/ansible-collections/ansible.windows checkout: main checkout_description: project default branch commit: 5223c6ae175b13ca5b72ec922c40dd0b6ba20f76 name: ansible-collections/ansible.windows required: true short_name: ansible.windows src_dir: src/github.com/ansible-collections/ansible.windows github.com/ansible-collections/community.aws: canonical_hostname: github.com canonical_name: github.com/ansible-collections/community.aws checkout: stable-10 checkout_description: zuul branch commit: 9f85eae0fc560fddad2da975b5229cd0935e9ab9 name: ansible-collections/community.aws required: true short_name: community.aws src_dir: src/github.com/ansible-collections/community.aws github.com/ansible-collections/community.crypto: canonical_hostname: github.com canonical_name: github.com/ansible-collections/community.crypto checkout: main checkout_description: project default branch commit: 26b90d5542cdc5f6446fe40d1ad958d9961733be name: ansible-collections/community.crypto required: true short_name: community.crypto src_dir: src/github.com/ansible-collections/community.crypto github.com/ansible-collections/community.general: canonical_hostname: github.com canonical_name: github.com/ansible-collections/community.general checkout: stable-10 checkout_description: zuul branch commit: 2dd395bd1254aa40da3fee572454d6d673b4550b name: ansible-collections/community.general required: true short_name: community.general src_dir: src/github.com/ansible-collections/community.general github.com/ansible-network/releases: canonical_hostname: github.com canonical_name: github.com/ansible-network/releases checkout: master checkout_description: project default branch commit: 646b310655c531e4904be07f4ff8fc3a29addd09 name: ansible-network/releases required: true short_name: releases src_dir: src/github.com/ansible-network/releases ref: refs/pull/2885/head resources: controller: context: main:zuul-worker/38-129-16-117:9023 namespace: main pod: zuul-worker-ansible-0005638983 stream_port: '41611' tenant: ansible timeout: 3600 topic: null voting: true zuul_use_fetch_output: true