--- /srv/reproducible-results/rbuild-debian/r-b-build.lUmAsRjv/b1/vmms_0.0.3_amd64.changes +++ /srv/reproducible-results/rbuild-debian/r-b-build.lUmAsRjv/b2/vmms_0.0.3_amd64.changes ├── Files │ @@ -1,5 +1,5 @@ │ │ ad684709ab9eefc517ff60addfce5798 22400 python optional python3-vmms_0.0.3_all.deb │ fa4f892dca43f37ea1d1431b219ca579 23608 net optional vmms-api_0.0.3_all.deb │ - c19494bf2b06014f51030b08dfb5f7b6 30424 net optional vmms-common_0.0.3_all.deb │ + de3e46475fdec171488a1488a58fd4de 30432 net optional vmms-common_0.0.3_all.deb │ 309f1c35fbd1d53aec414540d5de61be 5504 net optional vmms-worker_0.0.3_all.deb ├── vmms-common_0.0.3_all.deb │ ├── file list │ │ @@ -1,3 +1,3 @@ │ │ -rw-r--r-- 0 0 0 4 2025-11-26 08:48:01.000000 debian-binary │ │ -rw-r--r-- 0 0 0 19620 2025-11-26 08:48:01.000000 control.tar.xz │ │ --rw-r--r-- 0 0 0 10612 2025-11-26 08:48:01.000000 data.tar.xz │ │ +-rw-r--r-- 0 0 0 10620 2025-11-26 08:48:01.000000 data.tar.xz │ ├── control.tar.xz │ │ ├── control.tar │ │ │ ├── ./control │ │ │ │ @@ -1,13 +1,13 @@ │ │ │ │ Package: vmms-common │ │ │ │ Source: vmms │ │ │ │ Version: 0.0.3 │ │ │ │ Architecture: all │ │ │ │ Maintainer: Debian OpenStack │ │ │ │ -Installed-Size: 188 │ │ │ │ +Installed-Size: 189 │ │ │ │ Depends: adduser, dbconfig-common, debconf, gettext-base, openssh-client, python3-vmms (= 0.0.3), sqlite3, debconf (>= 0.5) | debconf-2.0, python3:any │ │ │ │ Section: net │ │ │ │ Priority: optional │ │ │ │ Homepage: https://salsa.debian.org/openstack-team/services/vmms │ │ │ │ Description: OpenStack VM migration scheduler - common files │ │ │ │ VM Migration Scheduler (aka: vmms) is an OpenStack project that makes it │ │ │ │ possible to schedule the migraiton of VMs from one cloud to another. Its API │ │ │ ├── ./md5sums │ │ │ │ ├── ./md5sums │ │ │ │ │┄ Files differ │ ├── data.tar.xz │ │ ├── data.tar │ │ │ ├── file list │ │ │ │ @@ -11,10 +11,10 @@ │ │ │ │ -rwxr-xr-x 0 root (0) root (0) 151 2025-11-26 08:48:01.000000 ./usr/bin/vmms-worker │ │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-11-26 08:48:01.000000 ./usr/share/ │ │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-11-26 08:48:01.000000 ./usr/share/doc/ │ │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-11-26 08:48:01.000000 ./usr/share/doc/vmms-common/ │ │ │ │ -rw-r--r-- 0 root (0) root (0) 285 2025-11-26 08:48:01.000000 ./usr/share/doc/vmms-common/changelog.gz │ │ │ │ -rw-r--r-- 0 root (0) root (0) 932 2025-11-26 08:48:01.000000 ./usr/share/doc/vmms-common/copyright │ │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-11-26 08:48:01.000000 ./usr/share/vmms-common/ │ │ │ │ --rw-r--r-- 0 root (0) root (0) 38804 2025-11-26 08:48:01.000000 ./usr/share/vmms-common/vmms.conf │ │ │ │ +-rw-r--r-- 0 root (0) root (0) 38982 2025-11-26 08:48:01.000000 ./usr/share/vmms-common/vmms.conf │ │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-11-26 08:48:01.000000 ./usr/share/vmms-common/workflows/ │ │ │ │ -rw-r--r-- 0 root (0) root (0) 985 2025-11-26 08:48:01.000000 ./usr/share/vmms-common/workflows/migrate_vm_workflow.yaml.j2 │ │ │ ├── ./usr/share/vmms-common/vmms.conf │ │ │ │ @@ -414,14 +414,17 @@ │ │ │ │ │ │ │ │ # Config Section from which to load plugin specific options (string value) │ │ │ │ #auth_section = │ │ │ │ │ │ │ │ # Authentication URL (string value) │ │ │ │ #auth_url = │ │ │ │ │ │ │ │ +# Scope for system operations (string value) │ │ │ │ +#system_scope = │ │ │ │ + │ │ │ │ # Domain ID to scope to (string value) │ │ │ │ #domain_id = │ │ │ │ │ │ │ │ # Domain name to scope to (string value) │ │ │ │ #domain_name = │ │ │ │ │ │ │ │ # Project ID to scope to (string value) │ │ │ │ @@ -432,45 +435,26 @@ │ │ │ │ │ │ │ │ # Domain ID containing project (string value) │ │ │ │ #project_domain_id = │ │ │ │ │ │ │ │ # Domain name containing project (string value) │ │ │ │ #project_domain_name = │ │ │ │ │ │ │ │ -# OAuth Consumer ID/Key (string value) │ │ │ │ -#consumer_key = │ │ │ │ - │ │ │ │ -# OAuth Consumer Secret (string value) │ │ │ │ -#consumer_secret = │ │ │ │ - │ │ │ │ -# OAuth Access Key (string value) │ │ │ │ -#access_key = │ │ │ │ +# ID of the trust to use as a trustee use (string value) │ │ │ │ +#trust_id = │ │ │ │ │ │ │ │ -# OAuth Access Secret (string value) │ │ │ │ -#access_secret = │ │ │ │ +# The token that will always be used (string value) │ │ │ │ +#token = │ │ │ │ │ │ │ │ # Tenant ID (string value) │ │ │ │ #tenant_id = │ │ │ │ │ │ │ │ # Tenant Name (string value) │ │ │ │ #tenant_name = │ │ │ │ │ │ │ │ -# ID of the trust to use as a trustee use (string value) │ │ │ │ -#trust_id = │ │ │ │ - │ │ │ │ -# Token to authenticate with (string value) │ │ │ │ -#token = │ │ │ │ - │ │ │ │ -# The endpoint that will always be used (string value) │ │ │ │ -# Deprecated group/name - [mistral]/url │ │ │ │ -#endpoint = │ │ │ │ - │ │ │ │ -# Scope for system operations (string value) │ │ │ │ -#system_scope = │ │ │ │ - │ │ │ │ # Identity Provider's name (string value) │ │ │ │ #identity_provider = │ │ │ │ │ │ │ │ # Protocol for federated plugin (string value) │ │ │ │ #protocol = │ │ │ │ │ │ │ │ # OAuth 2.0 Client ID (string value) │ │ │ │ @@ -491,23 +475,38 @@ │ │ │ │ # authentication endpoint. This URL should look like https://idp.example.org/.well-known/openid-configuration (string value) │ │ │ │ #discovery_endpoint = │ │ │ │ │ │ │ │ # OAuth 2.0 Authorization Server Introspection token type, it is used to decide which type of token will be used when processing token │ │ │ │ # introspection. Valid values are: "access_token" or "id_token" (string value) │ │ │ │ #access_token_type = │ │ │ │ │ │ │ │ -# Username (string value) │ │ │ │ +# User's username (string value) │ │ │ │ +# Deprecated group/name - [mistral]/user_name │ │ │ │ #username = │ │ │ │ │ │ │ │ -# Password (string value) │ │ │ │ +# User's password (string value) │ │ │ │ #password = │ │ │ │ │ │ │ │ # A key to be used in the Identity Provider access token endpoint to pass the OTP value. E.g. totp (string value) │ │ │ │ #idp_otp_key = │ │ │ │ │ │ │ │ +# Optional domain ID to use with v3 and v2 parameters. It will be used for both the user and project domain in v3 and ignored in v2 │ │ │ │ +# authentication. (string value) │ │ │ │ +#default_domain_id = │ │ │ │ + │ │ │ │ +# Optional domain name to use with v3 API and v2 parameters. It will be used for both the user and project domain in v3 and ignored in v2 │ │ │ │ +# authentication. (string value) │ │ │ │ +#default_domain_name = │ │ │ │ + │ │ │ │ +# OAuth 2.0 Access Token (string value) │ │ │ │ +#access_token = │ │ │ │ + │ │ │ │ +# The endpoint that will always be used (string value) │ │ │ │ +#endpoint = │ │ │ │ + │ │ │ │ # User's user ID (string value) │ │ │ │ #user_id = │ │ │ │ │ │ │ │ # User's domain ID (string value) │ │ │ │ #user_domain_id = │ │ │ │ │ │ │ │ # User's domain name (string value) │ │ │ │ @@ -518,62 +517,63 @@ │ │ │ │ │ │ │ │ # Application credential ID (string value) │ │ │ │ #application_credential_id = │ │ │ │ │ │ │ │ # Application credential name (string value) │ │ │ │ #application_credential_name = │ │ │ │ │ │ │ │ -# OAuth 2.0 Device Authorization Endpoint. Note that if a discovery document is being passed this option will override the endpoint provided │ │ │ │ -# by the server in the discovery document. (string value) │ │ │ │ -#device_authorization_endpoint = │ │ │ │ +# An Identity Provider URL, where the SAML authentication request will be sent. (string value) │ │ │ │ +#identity_provider_url = │ │ │ │ │ │ │ │ -# PKCE Challenge Method (RFC 7636) (string value) │ │ │ │ -#code_challenge_method = │ │ │ │ +# Service Provider's Endpoint (string value) │ │ │ │ +#service_provider_endpoint = │ │ │ │ + │ │ │ │ +# Service Provider's SAML Entity ID (string value) │ │ │ │ +#service_provider_entity_id = │ │ │ │ │ │ │ │ -# Endpoint for OAuth2.0 (string value) │ │ │ │ +# Endpoint for OAuth2.0 Mutual-TLS Authorization (string value) │ │ │ │ #oauth2_endpoint = │ │ │ │ │ │ │ │ -# Client id for OAuth2.0 (string value) │ │ │ │ +# Client credential ID for OAuth2.0 Mutual-TLS Authorization (string value) │ │ │ │ #oauth2_client_id = │ │ │ │ │ │ │ │ +# Client secret for OAuth2.0 (string value) │ │ │ │ +#oauth2_client_secret = │ │ │ │ + │ │ │ │ # OpenID Connect Redirect URL (string value) │ │ │ │ #redirect_uri = │ │ │ │ │ │ │ │ # OAuth 2.0 Authorization Code (string value) │ │ │ │ # Deprecated group/name - [mistral]/authorization_code │ │ │ │ #code = │ │ │ │ │ │ │ │ -# Optional domain ID to use with v3 and v2 parameters. It will be used for both the user and project domain in v3 and ignored in v2 │ │ │ │ -# authentication. (string value) │ │ │ │ -#default_domain_id = │ │ │ │ - │ │ │ │ -# Optional domain name to use with v3 API and v2 parameters. It will be used for both the user and project domain in v3 and ignored in v2 │ │ │ │ -# authentication. (string value) │ │ │ │ -#default_domain_name = │ │ │ │ - │ │ │ │ -# An Identity Provider URL, where the SAML authentication request will be sent. (string value) │ │ │ │ -#identity_provider_url = │ │ │ │ - │ │ │ │ -# OAuth 2.0 Access Token (string value) │ │ │ │ -#access_token = │ │ │ │ - │ │ │ │ # Methods to authenticate with. (string value) │ │ │ │ #auth_methods = │ │ │ │ │ │ │ │ # User's TOTP passcode (string value) │ │ │ │ #passcode = │ │ │ │ │ │ │ │ -# Client secret for OAuth2.0 (string value) │ │ │ │ -#oauth2_client_secret = │ │ │ │ +# OAuth Consumer ID/Key (string value) │ │ │ │ +#consumer_key = │ │ │ │ │ │ │ │ -# Service Provider's Endpoint (string value) │ │ │ │ -#service_provider_endpoint = │ │ │ │ +# OAuth Consumer Secret (string value) │ │ │ │ +#consumer_secret = │ │ │ │ │ │ │ │ -# Service Provider's SAML Entity ID (string value) │ │ │ │ -#service_provider_entity_id = │ │ │ │ +# OAuth Access Key (string value) │ │ │ │ +#access_key = │ │ │ │ + │ │ │ │ +# OAuth Access Secret (string value) │ │ │ │ +#access_secret = │ │ │ │ + │ │ │ │ +# OAuth 2.0 Device Authorization Endpoint. Note that if a discovery document is being passed this option will override the endpoint provided │ │ │ │ +# by the server in the discovery document. (string value) │ │ │ │ +#device_authorization_endpoint = │ │ │ │ + │ │ │ │ +# PKCE Challenge Method (RFC 7636) (string value) │ │ │ │ +#code_challenge_method = │ │ │ │ │ │ │ │ # PEM encoded Certificate Authority to use when verifying HTTPs connections. (string value) │ │ │ │ #cafile = │ │ │ │ │ │ │ │ # PEM encoded client certificate cert file (string value) │ │ │ │ #certfile = │ │ │ │ │ │ │ │ @@ -713,14 +713,17 @@ │ │ │ │ │ │ │ │ # Config Section from which to load plugin specific options (string value) │ │ │ │ #auth_section = │ │ │ │ │ │ │ │ # Authentication URL (string value) │ │ │ │ #auth_url = │ │ │ │ │ │ │ │ +# Scope for system operations (string value) │ │ │ │ +#system_scope = │ │ │ │ + │ │ │ │ # Domain ID to scope to (string value) │ │ │ │ #domain_id = │ │ │ │ │ │ │ │ # Domain name to scope to (string value) │ │ │ │ #domain_name = │ │ │ │ │ │ │ │ # Project ID to scope to (string value) │ │ │ │ @@ -731,45 +734,26 @@ │ │ │ │ │ │ │ │ # Domain ID containing project (string value) │ │ │ │ #project_domain_id = │ │ │ │ │ │ │ │ # Domain name containing project (string value) │ │ │ │ #project_domain_name = │ │ │ │ │ │ │ │ -# OAuth Consumer ID/Key (string value) │ │ │ │ -#consumer_key = │ │ │ │ - │ │ │ │ -# OAuth Consumer Secret (string value) │ │ │ │ -#consumer_secret = │ │ │ │ - │ │ │ │ -# OAuth Access Key (string value) │ │ │ │ -#access_key = │ │ │ │ +# ID of the trust to use as a trustee use (string value) │ │ │ │ +#trust_id = │ │ │ │ │ │ │ │ -# OAuth Access Secret (string value) │ │ │ │ -#access_secret = │ │ │ │ +# The token that will always be used (string value) │ │ │ │ +#token = │ │ │ │ │ │ │ │ # Tenant ID (string value) │ │ │ │ #tenant_id = │ │ │ │ │ │ │ │ # Tenant Name (string value) │ │ │ │ #tenant_name = │ │ │ │ │ │ │ │ -# ID of the trust to use as a trustee use (string value) │ │ │ │ -#trust_id = │ │ │ │ - │ │ │ │ -# Token to authenticate with (string value) │ │ │ │ -#token = │ │ │ │ - │ │ │ │ -# The endpoint that will always be used (string value) │ │ │ │ -# Deprecated group/name - [source_cloud]/url │ │ │ │ -#endpoint = │ │ │ │ - │ │ │ │ -# Scope for system operations (string value) │ │ │ │ -#system_scope = │ │ │ │ - │ │ │ │ # Identity Provider's name (string value) │ │ │ │ #identity_provider = │ │ │ │ │ │ │ │ # Protocol for federated plugin (string value) │ │ │ │ #protocol = │ │ │ │ │ │ │ │ # OAuth 2.0 Client ID (string value) │ │ │ │ @@ -790,23 +774,38 @@ │ │ │ │ # authentication endpoint. This URL should look like https://idp.example.org/.well-known/openid-configuration (string value) │ │ │ │ #discovery_endpoint = │ │ │ │ │ │ │ │ # OAuth 2.0 Authorization Server Introspection token type, it is used to decide which type of token will be used when processing token │ │ │ │ # introspection. Valid values are: "access_token" or "id_token" (string value) │ │ │ │ #access_token_type = │ │ │ │ │ │ │ │ -# Username (string value) │ │ │ │ +# User's username (string value) │ │ │ │ +# Deprecated group/name - [source_cloud]/user_name │ │ │ │ #username = │ │ │ │ │ │ │ │ -# Password (string value) │ │ │ │ +# User's password (string value) │ │ │ │ #password = │ │ │ │ │ │ │ │ # A key to be used in the Identity Provider access token endpoint to pass the OTP value. E.g. totp (string value) │ │ │ │ #idp_otp_key = │ │ │ │ │ │ │ │ +# Optional domain ID to use with v3 and v2 parameters. It will be used for both the user and project domain in v3 and ignored in v2 │ │ │ │ +# authentication. (string value) │ │ │ │ +#default_domain_id = │ │ │ │ + │ │ │ │ +# Optional domain name to use with v3 API and v2 parameters. It will be used for both the user and project domain in v3 and ignored in v2 │ │ │ │ +# authentication. (string value) │ │ │ │ +#default_domain_name = │ │ │ │ + │ │ │ │ +# OAuth 2.0 Access Token (string value) │ │ │ │ +#access_token = │ │ │ │ + │ │ │ │ +# The endpoint that will always be used (string value) │ │ │ │ +#endpoint = │ │ │ │ + │ │ │ │ # User's user ID (string value) │ │ │ │ #user_id = │ │ │ │ │ │ │ │ # User's domain ID (string value) │ │ │ │ #user_domain_id = │ │ │ │ │ │ │ │ # User's domain name (string value) │ │ │ │ @@ -817,62 +816,63 @@ │ │ │ │ │ │ │ │ # Application credential ID (string value) │ │ │ │ #application_credential_id = │ │ │ │ │ │ │ │ # Application credential name (string value) │ │ │ │ #application_credential_name = │ │ │ │ │ │ │ │ -# OAuth 2.0 Device Authorization Endpoint. Note that if a discovery document is being passed this option will override the endpoint provided │ │ │ │ -# by the server in the discovery document. (string value) │ │ │ │ -#device_authorization_endpoint = │ │ │ │ +# An Identity Provider URL, where the SAML authentication request will be sent. (string value) │ │ │ │ +#identity_provider_url = │ │ │ │ │ │ │ │ -# PKCE Challenge Method (RFC 7636) (string value) │ │ │ │ -#code_challenge_method = │ │ │ │ +# Service Provider's Endpoint (string value) │ │ │ │ +#service_provider_endpoint = │ │ │ │ + │ │ │ │ +# Service Provider's SAML Entity ID (string value) │ │ │ │ +#service_provider_entity_id = │ │ │ │ │ │ │ │ -# Endpoint for OAuth2.0 (string value) │ │ │ │ +# Endpoint for OAuth2.0 Mutual-TLS Authorization (string value) │ │ │ │ #oauth2_endpoint = │ │ │ │ │ │ │ │ -# Client id for OAuth2.0 (string value) │ │ │ │ +# Client credential ID for OAuth2.0 Mutual-TLS Authorization (string value) │ │ │ │ #oauth2_client_id = │ │ │ │ │ │ │ │ +# Client secret for OAuth2.0 (string value) │ │ │ │ +#oauth2_client_secret = │ │ │ │ + │ │ │ │ # OpenID Connect Redirect URL (string value) │ │ │ │ #redirect_uri = │ │ │ │ │ │ │ │ # OAuth 2.0 Authorization Code (string value) │ │ │ │ # Deprecated group/name - [source_cloud]/authorization_code │ │ │ │ #code = │ │ │ │ │ │ │ │ -# Optional domain ID to use with v3 and v2 parameters. It will be used for both the user and project domain in v3 and ignored in v2 │ │ │ │ -# authentication. (string value) │ │ │ │ -#default_domain_id = │ │ │ │ - │ │ │ │ -# Optional domain name to use with v3 API and v2 parameters. It will be used for both the user and project domain in v3 and ignored in v2 │ │ │ │ -# authentication. (string value) │ │ │ │ -#default_domain_name = │ │ │ │ - │ │ │ │ -# An Identity Provider URL, where the SAML authentication request will be sent. (string value) │ │ │ │ -#identity_provider_url = │ │ │ │ - │ │ │ │ -# OAuth 2.0 Access Token (string value) │ │ │ │ -#access_token = │ │ │ │ - │ │ │ │ # Methods to authenticate with. (string value) │ │ │ │ #auth_methods = │ │ │ │ │ │ │ │ # User's TOTP passcode (string value) │ │ │ │ #passcode = │ │ │ │ │ │ │ │ -# Client secret for OAuth2.0 (string value) │ │ │ │ -#oauth2_client_secret = │ │ │ │ +# OAuth Consumer ID/Key (string value) │ │ │ │ +#consumer_key = │ │ │ │ │ │ │ │ -# Service Provider's Endpoint (string value) │ │ │ │ -#service_provider_endpoint = │ │ │ │ +# OAuth Consumer Secret (string value) │ │ │ │ +#consumer_secret = │ │ │ │ │ │ │ │ -# Service Provider's SAML Entity ID (string value) │ │ │ │ -#service_provider_entity_id = │ │ │ │ +# OAuth Access Key (string value) │ │ │ │ +#access_key = │ │ │ │ + │ │ │ │ +# OAuth Access Secret (string value) │ │ │ │ +#access_secret = │ │ │ │ + │ │ │ │ +# OAuth 2.0 Device Authorization Endpoint. Note that if a discovery document is being passed this option will override the endpoint provided │ │ │ │ +# by the server in the discovery document. (string value) │ │ │ │ +#device_authorization_endpoint = │ │ │ │ + │ │ │ │ +# PKCE Challenge Method (RFC 7636) (string value) │ │ │ │ +#code_challenge_method = │ │ │ │ │ │ │ │ # PEM encoded Certificate Authority to use when verifying HTTPs connections. (string value) │ │ │ │ #cafile = │ │ │ │ │ │ │ │ # PEM encoded client certificate cert file (string value) │ │ │ │ #certfile =