--- /srv/rebuilderd/tmp/rebuilderdkU9jlh/inputs/jupyterhub_5.2.1+ds1-4_all.deb +++ /srv/rebuilderd/tmp/rebuilderdkU9jlh/out/jupyterhub_5.2.1+ds1-4_all.deb ├── file list │ @@ -1,3 +1,3 @@ │ -rw-r--r-- 0 0 0 4 2025-05-28 09:40:25.000000 debian-binary │ -rw-r--r-- 0 0 0 59496 2025-05-28 09:40:25.000000 control.tar.xz │ --rw-r--r-- 0 0 0 1962752 2025-05-28 09:40:25.000000 data.tar.xz │ +-rw-r--r-- 0 0 0 1962980 2025-05-28 09:40:25.000000 data.tar.xz ├── control.tar.xz │ ├── control.tar │ │ ├── ./md5sums │ │ │ ├── ./md5sums │ │ │ │┄ Files differ ├── data.tar.xz │ ├── data.tar │ │ ├── file list │ │ │ @@ -146,15 +146,15 @@ │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-05-28 09:40:25.000000 ./usr/share/doc/ │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-05-28 09:40:25.000000 ./usr/share/doc/jupyterhub/ │ │ │ -rw-r--r-- 0 root (0) root (0) 1679 2025-05-28 09:40:25.000000 ./usr/share/doc/jupyterhub/README.Debian.md │ │ │ -rw-r--r-- 0 root (0) root (0) 3837 2024-10-21 09:35:53.000000 ./usr/share/doc/jupyterhub/README.md.gz │ │ │ -rw-r--r-- 0 root (0) root (0) 1363 2025-05-28 09:40:25.000000 ./usr/share/doc/jupyterhub/changelog.Debian.gz │ │ │ -rw-r--r-- 0 root (0) root (0) 2121 2025-05-28 09:40:25.000000 ./usr/share/doc/jupyterhub/copyright │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-05-28 09:40:25.000000 ./usr/share/jupyterhub/ │ │ │ --rw-r--r-- 0 root (0) root (0) 98384 2025-05-28 09:40:25.000000 ./usr/share/jupyterhub/jupyterhub_config.py │ │ │ +-rw-r--r-- 0 root (0) root (0) 98386 2025-05-28 09:40:25.000000 ./usr/share/jupyterhub/jupyterhub_config.py │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-05-28 09:40:25.000000 ./usr/share/jupyterhub/static/ │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-05-28 09:40:25.000000 ./usr/share/jupyterhub/static/components/ │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-05-28 09:40:25.000000 ./usr/share/jupyterhub/static/components/@fortawesome/ │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-05-28 09:40:25.000000 ./usr/share/jupyterhub/static/components/@fortawesome/fontawesome-free/ │ │ │ -rw-r--r-- 0 root (0) root (0) 7427 2024-10-21 09:36:01.000000 ./usr/share/jupyterhub/static/components/@fortawesome/fontawesome-free/LICENSE.txt │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-05-28 09:40:25.000000 ./usr/share/jupyterhub/static/components/@fortawesome/fontawesome-free/css/ │ │ │ -rw-r--r-- 0 root (0) root (0) 132658 2024-10-21 09:36:00.000000 ./usr/share/jupyterhub/static/components/@fortawesome/fontawesome-free/css/all.css │ │ ├── ./usr/share/jupyterhub/jupyterhub_config.py │ │ │ @@ -2178,14 +2178,118 @@ │ │ │ # c.Authenticator.username_pattern = '' │ │ │ │ │ │ ## Deprecated, use `Authenticator.allowed_users` │ │ │ # Default: set() │ │ │ # c.Authenticator.whitelist = set() │ │ │ │ │ │ #------------------------------------------------------------------------------ │ │ │ +# DummyAuthenticator(Authenticator) configuration │ │ │ +#------------------------------------------------------------------------------ │ │ │ +## Dummy Authenticator for testing │ │ │ +# │ │ │ +# By default, any username + password is allowed If a non-empty password is set, │ │ │ +# any username will be allowed if it logs in with that password. │ │ │ +# │ │ │ +# .. versionadded:: 1.0 │ │ │ +# │ │ │ +# .. versionadded:: 5.0 │ │ │ +# `allow_all` defaults to True, │ │ │ +# preserving default behavior. │ │ │ + │ │ │ +## │ │ │ +# See also: Authenticator.admin_users │ │ │ +# c.DummyAuthenticator.admin_users = set() │ │ │ + │ │ │ +## │ │ │ +# See also: Authenticator.allow_all │ │ │ +# c.DummyAuthenticator.allow_all = False │ │ │ + │ │ │ +## │ │ │ +# See also: Authenticator.allow_existing_users │ │ │ +# c.DummyAuthenticator.allow_existing_users = False │ │ │ + │ │ │ +## │ │ │ +# See also: Authenticator.allowed_users │ │ │ +# c.DummyAuthenticator.allowed_users = set() │ │ │ + │ │ │ +## Is there any allow config? │ │ │ +# See also: Authenticator.any_allow_config │ │ │ +# c.DummyAuthenticator.any_allow_config = False │ │ │ + │ │ │ +## The max age (in seconds) of authentication info │ │ │ +# See also: Authenticator.auth_refresh_age │ │ │ +# c.DummyAuthenticator.auth_refresh_age = 300 │ │ │ + │ │ │ +## Automatically begin the login process │ │ │ +# See also: Authenticator.auto_login │ │ │ +# c.DummyAuthenticator.auto_login = False │ │ │ + │ │ │ +## │ │ │ +# See also: Authenticator.auto_login_oauth2_authorize │ │ │ +# c.DummyAuthenticator.auto_login_oauth2_authorize = False │ │ │ + │ │ │ +## │ │ │ +# See also: Authenticator.blocked_users │ │ │ +# c.DummyAuthenticator.blocked_users = set() │ │ │ + │ │ │ +## Delete any users from the database that do not pass validation │ │ │ +# See also: Authenticator.delete_invalid_users │ │ │ +# c.DummyAuthenticator.delete_invalid_users = False │ │ │ + │ │ │ +## Enable persisting auth_state (if available). │ │ │ +# See also: Authenticator.enable_auth_state │ │ │ +# c.DummyAuthenticator.enable_auth_state = False │ │ │ + │ │ │ +## Let authenticator manage user groups │ │ │ +# See also: Authenticator.manage_groups │ │ │ +# c.DummyAuthenticator.manage_groups = False │ │ │ + │ │ │ +## Let authenticator manage roles │ │ │ +# See also: Authenticator.manage_roles │ │ │ +# c.DummyAuthenticator.manage_roles = False │ │ │ + │ │ │ +## │ │ │ +# See also: Authenticator.otp_prompt │ │ │ +# c.DummyAuthenticator.otp_prompt = 'OTP:' │ │ │ + │ │ │ +## Set a global password for all users wanting to log in. │ │ │ +# │ │ │ +# This allows users with any username to log in with the same static password. │ │ │ +# Default: '' │ │ │ +# c.DummyAuthenticator.password = '' │ │ │ + │ │ │ +## │ │ │ +# See also: Authenticator.post_auth_hook │ │ │ +# c.DummyAuthenticator.post_auth_hook = None │ │ │ + │ │ │ +## Force refresh of auth prior to spawn. │ │ │ +# See also: Authenticator.refresh_pre_spawn │ │ │ +# c.DummyAuthenticator.refresh_pre_spawn = False │ │ │ + │ │ │ +## │ │ │ +# See also: Authenticator.request_otp │ │ │ +# c.DummyAuthenticator.request_otp = False │ │ │ + │ │ │ +## Reset managed roles to result of `load_managed_roles()` on startup. │ │ │ +# See also: Authenticator.reset_managed_roles_on_startup │ │ │ +# c.DummyAuthenticator.reset_managed_roles_on_startup = False │ │ │ + │ │ │ +## Dictionary mapping authenticator usernames to JupyterHub users. │ │ │ +# See also: Authenticator.username_map │ │ │ +# c.DummyAuthenticator.username_map = {} │ │ │ + │ │ │ +## │ │ │ +# See also: Authenticator.username_pattern │ │ │ +# c.DummyAuthenticator.username_pattern = '' │ │ │ + │ │ │ +## Deprecated, use `Authenticator.allowed_users` │ │ │ +# See also: Authenticator.whitelist │ │ │ +# c.DummyAuthenticator.whitelist = set() │ │ │ + │ │ │ +#------------------------------------------------------------------------------ │ │ │ # NullAuthenticator(Authenticator) configuration │ │ │ #------------------------------------------------------------------------------ │ │ │ ## Null Authenticator for JupyterHub │ │ │ # │ │ │ # For cases where authentication should be disabled, e.g. only allowing access │ │ │ # via API tokens. │ │ │ # │ │ │ @@ -2278,16 +2382,16 @@ │ │ │ # │ │ │ # Use via the encryption_config singleton below. │ │ │ │ │ │ # Default: [] │ │ │ # c.CryptKeeper.keys = [] │ │ │ │ │ │ ## The number of threads to allocate for encryption │ │ │ -# Default: 6 │ │ │ -# c.CryptKeeper.n_threads = 6 │ │ │ +# Default: 32 │ │ │ +# c.CryptKeeper.n_threads = 32 │ │ │ │ │ │ #------------------------------------------------------------------------------ │ │ │ # LocalAuthenticator(Authenticator) configuration │ │ │ #------------------------------------------------------------------------------ │ │ │ ## Base class for Authenticators that work with local Linux/UNIX users │ │ │ # │ │ │ # Checks for local users, and can attempt to create them if they exist. │ │ │ @@ -2697,111 +2801,7 @@ │ │ │ ## File in which to write the PID of the proxy process. │ │ │ # Default: 'jupyterhub-proxy.pid' │ │ │ # c.ConfigurableHTTPProxy.pid_file = 'jupyterhub-proxy.pid' │ │ │ │ │ │ ## Should the Hub start the proxy │ │ │ # See also: Proxy.should_start │ │ │ # c.ConfigurableHTTPProxy.should_start = True │ │ │ - │ │ │ -#------------------------------------------------------------------------------ │ │ │ -# DummyAuthenticator(Authenticator) configuration │ │ │ -#------------------------------------------------------------------------------ │ │ │ -## Dummy Authenticator for testing │ │ │ -# │ │ │ -# By default, any username + password is allowed If a non-empty password is set, │ │ │ -# any username will be allowed if it logs in with that password. │ │ │ -# │ │ │ -# .. versionadded:: 1.0 │ │ │ -# │ │ │ -# .. versionadded:: 5.0 │ │ │ -# `allow_all` defaults to True, │ │ │ -# preserving default behavior. │ │ │ - │ │ │ -## │ │ │ -# See also: Authenticator.admin_users │ │ │ -# c.DummyAuthenticator.admin_users = set() │ │ │ - │ │ │ -## │ │ │ -# See also: Authenticator.allow_all │ │ │ -# c.DummyAuthenticator.allow_all = False │ │ │ - │ │ │ -## │ │ │ -# See also: Authenticator.allow_existing_users │ │ │ -# c.DummyAuthenticator.allow_existing_users = False │ │ │ - │ │ │ -## │ │ │ -# See also: Authenticator.allowed_users │ │ │ -# c.DummyAuthenticator.allowed_users = set() │ │ │ - │ │ │ -## Is there any allow config? │ │ │ -# See also: Authenticator.any_allow_config │ │ │ -# c.DummyAuthenticator.any_allow_config = False │ │ │ - │ │ │ -## The max age (in seconds) of authentication info │ │ │ -# See also: Authenticator.auth_refresh_age │ │ │ -# c.DummyAuthenticator.auth_refresh_age = 300 │ │ │ - │ │ │ -## Automatically begin the login process │ │ │ -# See also: Authenticator.auto_login │ │ │ -# c.DummyAuthenticator.auto_login = False │ │ │ - │ │ │ -## │ │ │ -# See also: Authenticator.auto_login_oauth2_authorize │ │ │ -# c.DummyAuthenticator.auto_login_oauth2_authorize = False │ │ │ - │ │ │ -## │ │ │ -# See also: Authenticator.blocked_users │ │ │ -# c.DummyAuthenticator.blocked_users = set() │ │ │ - │ │ │ -## Delete any users from the database that do not pass validation │ │ │ -# See also: Authenticator.delete_invalid_users │ │ │ -# c.DummyAuthenticator.delete_invalid_users = False │ │ │ - │ │ │ -## Enable persisting auth_state (if available). │ │ │ -# See also: Authenticator.enable_auth_state │ │ │ -# c.DummyAuthenticator.enable_auth_state = False │ │ │ - │ │ │ -## Let authenticator manage user groups │ │ │ -# See also: Authenticator.manage_groups │ │ │ -# c.DummyAuthenticator.manage_groups = False │ │ │ - │ │ │ -## Let authenticator manage roles │ │ │ -# See also: Authenticator.manage_roles │ │ │ -# c.DummyAuthenticator.manage_roles = False │ │ │ - │ │ │ -## │ │ │ -# See also: Authenticator.otp_prompt │ │ │ -# c.DummyAuthenticator.otp_prompt = 'OTP:' │ │ │ - │ │ │ -## Set a global password for all users wanting to log in. │ │ │ -# │ │ │ -# This allows users with any username to log in with the same static password. │ │ │ -# Default: '' │ │ │ -# c.DummyAuthenticator.password = '' │ │ │ - │ │ │ -## │ │ │ -# See also: Authenticator.post_auth_hook │ │ │ -# c.DummyAuthenticator.post_auth_hook = None │ │ │ - │ │ │ -## Force refresh of auth prior to spawn. │ │ │ -# See also: Authenticator.refresh_pre_spawn │ │ │ -# c.DummyAuthenticator.refresh_pre_spawn = False │ │ │ - │ │ │ -## │ │ │ -# See also: Authenticator.request_otp │ │ │ -# c.DummyAuthenticator.request_otp = False │ │ │ - │ │ │ -## Reset managed roles to result of `load_managed_roles()` on startup. │ │ │ -# See also: Authenticator.reset_managed_roles_on_startup │ │ │ -# c.DummyAuthenticator.reset_managed_roles_on_startup = False │ │ │ - │ │ │ -## Dictionary mapping authenticator usernames to JupyterHub users. │ │ │ -# See also: Authenticator.username_map │ │ │ -# c.DummyAuthenticator.username_map = {} │ │ │ - │ │ │ -## │ │ │ -# See also: Authenticator.username_pattern │ │ │ -# c.DummyAuthenticator.username_pattern = '' │ │ │ - │ │ │ -## Deprecated, use `Authenticator.allowed_users` │ │ │ -# See also: Authenticator.whitelist │ │ │ -# c.DummyAuthenticator.whitelist = set()