{"diffoscope-json-version": 1, "source1": "/srv/reproducible-results/rbuild-debian/r-b-build.mdqcEM0F/b1/neutron-ipv6-bgp-injector_0.0.1_arm64.changes", "source2": "/srv/reproducible-results/rbuild-debian/r-b-build.mdqcEM0F/b2/neutron-ipv6-bgp-injector_0.0.1_arm64.changes", "unified_diff": null, "details": [{"source1": "Files", "source2": "Files", "unified_diff": "@@ -1,2 +1,2 @@\n \n- 4642a92d5a231c8ead94ab9c6976935d 30280 net optional neutron-ipv6-bgp-injector_0.0.1_all.deb\n+ 6bbe49cf395d2699dbe8ed9d10d068e9 30272 net optional neutron-ipv6-bgp-injector_0.0.1_all.deb\n"}, {"source1": "neutron-ipv6-bgp-injector_0.0.1_all.deb", "source2": "neutron-ipv6-bgp-injector_0.0.1_all.deb", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -1,3 +1,3 @@\n -rw-r--r-- 0 0 0 4 2025-09-05 13:29:35.000000 debian-binary\n -rw-r--r-- 0 0 0 12468 2025-09-05 13:29:35.000000 control.tar.xz\n--rw-r--r-- 0 0 0 17620 2025-09-05 13:29:35.000000 data.tar.xz\n+-rw-r--r-- 0 0 0 17612 2025-09-05 13:29:35.000000 data.tar.xz\n"}, {"source1": "data.tar.xz", "source2": "data.tar.xz", "unified_diff": null, "details": [{"source1": "data.tar", "source2": "data.tar", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -1,13 +1,13 @@\n drwxr-xr-x 0 root (0) root (0) 0 2025-09-05 13:29:35.000000 ./\n drwxr-xr-x 0 root (0) root (0) 0 2025-09-05 13:29:35.000000 ./etc/\n drwxr-xr-x 0 root (0) root (0) 0 2025-09-05 13:29:35.000000 ./etc/logrotate.d/\n -rw-r--r-- 0 root (0) root (0) 132 2025-09-05 13:29:35.000000 ./etc/logrotate.d/neutron-ipv6-bgp-injector\n drwxr-xr-x 0 root (0) root (0) 0 2025-09-05 13:29:35.000000 ./etc/neutron-ipv6-bgp-injector/\n--rw-r--r-- 0 root (0) root (0) 29192 2025-09-05 13:29:35.000000 ./etc/neutron-ipv6-bgp-injector/neutron-ipv6-bgp-injector.conf\n+-rw-r--r-- 0 root (0) root (0) 29166 2025-09-05 13:29:35.000000 ./etc/neutron-ipv6-bgp-injector/neutron-ipv6-bgp-injector.conf\n drwxr-xr-x 0 root (0) root (0) 0 2025-09-05 13:29:35.000000 ./usr/\n drwxr-xr-x 0 root (0) root (0) 0 2025-09-05 13:29:35.000000 ./usr/bin/\n -rwxr-xr-x 0 root (0) root (0) 190 2025-09-05 13:29:35.000000 ./usr/bin/neutron-ipv6-bgp-injector\n drwxr-xr-x 0 root (0) root (0) 0 2025-09-05 13:29:35.000000 ./usr/lib/\n drwxr-xr-x 0 root (0) root (0) 0 2025-09-05 13:29:35.000000 ./usr/lib/python3/\n drwxr-xr-x 0 root (0) root (0) 0 2025-09-05 13:29:35.000000 ./usr/lib/python3/dist-packages/\n drwxr-xr-x 0 root (0) root (0) 0 2025-09-05 13:29:35.000000 ./usr/lib/python3/dist-packages/neutron_ipv6_bgp_injector/\n"}, {"source1": "./etc/neutron-ipv6-bgp-injector/neutron-ipv6-bgp-injector.conf", "source2": "./etc/neutron-ipv6-bgp-injector/neutron-ipv6-bgp-injector.conf", "unified_diff": "@@ -213,40 +213,72 @@\n \n # Config Section from which to load plugin specific options (string value)\n #auth_section = \n \n # Authentication URL (string value)\n #auth_url = \n \n-# Scope for system operations (string value)\n-#system_scope = \n-\n # Domain ID to scope to (string value)\n #domain_id = \n \n # Domain name to scope to (string value)\n #domain_name = \n \n # Project ID to scope to (string value)\n-# Deprecated group/name - [neutron]/tenant_id\n #project_id = \n \n # Project name to scope to (string value)\n-# Deprecated group/name - [neutron]/tenant_name\n #project_name = \n \n # Domain ID containing project (string value)\n #project_domain_id = \n \n # Domain name containing project (string value)\n #project_domain_name = \n \n+# OAuth Consumer ID/Key (string value)\n+#consumer_key = \n+\n+# OAuth Consumer Secret (string value)\n+#consumer_secret = \n+\n+# OAuth Access Key (string value)\n+#access_key = \n+\n+# OAuth Access Secret (string value)\n+#access_secret = \n+\n+# Scope for system operations (string value)\n+#system_scope = \n+\n # ID of the trust to use as a trustee use (string value)\n #trust_id = \n \n+# Endpoint for OAuth2.0 (string value)\n+#oauth2_endpoint = \n+\n+# Client id for OAuth2.0 (string value)\n+#oauth2_client_id = \n+\n+# User ID to login with (string value)\n+#user_id = \n+\n+# Username to login with (string value)\n+# Deprecated group/name - [neutron]/user_name\n+#username = \n+\n+# User's domain ID (string value)\n+#user_domain_id = \n+\n+# User's domain name (string value)\n+#user_domain_name = \n+\n+# Password to use (string value)\n+#password = \n+\n # Identity Provider's name (string value)\n #identity_provider = \n \n # Protocol for federated plugin (string value)\n #protocol = \n \n # OAuth 2.0 Client ID (string value)\n@@ -274,107 +306,74 @@\n # OpenID Connect Redirect URL (string value)\n #redirect_uri = \n \n # OAuth 2.0 Authorization Code (string value)\n # Deprecated group/name - [neutron]/authorization_code\n #code = \n \n+# OAuth 2.0 Access Token (string value)\n+#access_token = \n+\n+# The endpoint that will always be used (string value)\n+# Deprecated group/name - [neutron]/url\n+#endpoint = \n+\n # Optional domain ID to use with v3 and v2 parameters. It will be used for both the user and project domain in v3 and ignored in v2\n # authentication. (string value)\n #default_domain_id = \n \n # Optional domain name to use with v3 API and v2 parameters. It will be used for both the user and project domain in v3 and ignored in v2\n # authentication. (string value)\n #default_domain_name = \n \n+# Client secret for OAuth2.0 (string value)\n+#oauth2_client_secret = \n+\n # The token that will always be used (string value)\n #token = \n \n-# Username (string value)\n-# Deprecated group/name - [neutron]/user_name\n-#username = \n-\n-# User's password (string value)\n-#password = \n-\n-# A key to be used in the Identity Provider access token endpoint to pass the OTP value. E.g. totp (string value)\n-#idp_otp_key = \n-\n-# OAuth Consumer ID/Key (string value)\n-#consumer_key = \n-\n-# OAuth Consumer Secret (string value)\n-#consumer_secret = \n-\n-# OAuth Access Key (string value)\n-#access_key = \n-\n-# OAuth Access Secret (string value)\n-#access_secret = \n-\n-# An Identity Provider URL, where the SAML authentication request will be sent. (string value)\n-#identity_provider_url = \n-\n # Methods to authenticate with. (string value)\n #auth_methods = \n \n-# User id (string value)\n-#user_id = \n-\n-# User's domain id (string value)\n-#user_domain_id = \n-\n-# User's domain name (string value)\n-#user_domain_name = \n-\n # User's TOTP passcode (string value)\n #passcode = \n \n-# Endpoint for OAuth2.0 (string value)\n-#oauth2_endpoint = \n+# An Identity Provider URL, where the SAML authentication request will be sent. (string value)\n+#identity_provider_url = \n \n-# Client id for OAuth2.0 (string value)\n-#oauth2_client_id = \n+# Service Provider's Endpoint (string value)\n+#service_provider_endpoint = \n \n-# OAuth 2.0 Access Token (string value)\n-#access_token = \n+# Service Provider's SAML Entity ID (string value)\n+#service_provider_entity_id = \n \n-# Tenant ID (string value)\n-#tenant_id = \n+# Application credential auth secret (string value)\n+#application_credential_secret = \n \n-# Tenant Name (string value)\n-#tenant_name = \n+# Application credential ID (string value)\n+#application_credential_id = \n \n-# The endpoint that will always be used (string value)\n-#endpoint = \n+# Application credential name (string value)\n+#application_credential_name = \n \n # OAuth 2.0 Device Authorization Endpoint. Note that if a discovery document is being passed this option will override the endpoint provided\n # by the server in the discovery document. (string value)\n #device_authorization_endpoint = \n \n # PKCE Challenge Method (RFC 7636) (string value)\n #code_challenge_method = \n \n-# Client secret for OAuth2.0 (string value)\n-#oauth2_client_secret = \n-\n-# Application credential auth secret (string value)\n-#application_credential_secret = \n-\n-# Application credential ID (string value)\n-#application_credential_id = \n-\n-# Application credential name (string value)\n-#application_credential_name = \n+# Tenant ID (string value)\n+#tenant_id = \n \n-# Service Provider's Endpoint (string value)\n-#service_provider_endpoint = \n+# Tenant Name (string value)\n+#tenant_name = \n \n-# Service Provider's SAML Entity ID (string value)\n-#service_provider_entity_id = \n+# A key to be used in the Identity Provider access token endpoint to pass the OTP value. E.g. totp (string value)\n+#idp_otp_key = \n \n # PEM encoded Certificate Authority to use when verifying HTTPs connections. (string value)\n #cafile = \n \n # PEM encoded client certificate cert file (string value)\n #certfile = \n \n"}]}]}]}]}