--- /srv/rebuilderd/tmp/rebuilderdJ21qsJ/inputs/vmms-common_0.0.3_all.deb +++ /srv/rebuilderd/tmp/rebuilderdJ21qsJ/out/vmms-common_0.0.3_all.deb ├── file list │ @@ -1,3 +1,3 @@ │ -rw-r--r-- 0 0 0 4 2025-11-26 08:48:01.000000 debian-binary │ --rw-r--r-- 0 0 0 19620 2025-11-26 08:48:01.000000 control.tar.xz │ --rw-r--r-- 0 0 0 10620 2025-11-26 08:48:01.000000 data.tar.xz │ +-rw-r--r-- 0 0 0 19624 2025-11-26 08:48:01.000000 control.tar.xz │ +-rw-r--r-- 0 0 0 10636 2025-11-26 08:48:01.000000 data.tar.xz ├── control.tar.xz │ ├── control.tar │ │ ├── ./md5sums │ │ │ ├── ./md5sums │ │ │ │┄ Files differ ├── data.tar.xz │ ├── data.tar │ │ ├── file list │ │ │ @@ -11,10 +11,10 @@ │ │ │ -rwxr-xr-x 0 root (0) root (0) 151 2025-11-26 08:48:01.000000 ./usr/bin/vmms-worker │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-11-26 08:48:01.000000 ./usr/share/ │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-11-26 08:48:01.000000 ./usr/share/doc/ │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-11-26 08:48:01.000000 ./usr/share/doc/vmms-common/ │ │ │ -rw-r--r-- 0 root (0) root (0) 285 2025-11-26 08:48:01.000000 ./usr/share/doc/vmms-common/changelog.gz │ │ │ -rw-r--r-- 0 root (0) root (0) 932 2025-11-26 08:48:01.000000 ./usr/share/doc/vmms-common/copyright │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-11-26 08:48:01.000000 ./usr/share/vmms-common/ │ │ │ --rw-r--r-- 0 root (0) root (0) 38968 2025-11-26 08:48:01.000000 ./usr/share/vmms-common/vmms.conf │ │ │ +-rw-r--r-- 0 root (0) root (0) 39094 2025-11-26 08:48:01.000000 ./usr/share/vmms-common/vmms.conf │ │ │ drwxr-xr-x 0 root (0) root (0) 0 2025-11-26 08:48:01.000000 ./usr/share/vmms-common/workflows/ │ │ │ -rw-r--r-- 0 root (0) root (0) 985 2025-11-26 08:48:01.000000 ./usr/share/vmms-common/workflows/migrate_vm_workflow.yaml.j2 │ │ ├── ./usr/share/vmms-common/vmms.conf │ │ │ @@ -424,17 +424,19 @@ │ │ │ # Domain ID to scope to (string value) │ │ │ #domain_id = │ │ │ │ │ │ # Domain name to scope to (string value) │ │ │ #domain_name = │ │ │ │ │ │ # Project ID to scope to (string value) │ │ │ +# Deprecated group/name - [mistral]/tenant_id │ │ │ #project_id = │ │ │ │ │ │ # Project name to scope to (string value) │ │ │ +# Deprecated group/name - [mistral]/tenant_name │ │ │ #project_name = │ │ │ │ │ │ # Domain ID containing project (string value) │ │ │ #project_domain_id = │ │ │ │ │ │ # Domain name containing project (string value) │ │ │ #project_domain_name = │ │ │ @@ -444,14 +446,36 @@ │ │ │ │ │ │ # Identity Provider's name (string value) │ │ │ #identity_provider = │ │ │ │ │ │ # Protocol for federated plugin (string value) │ │ │ #protocol = │ │ │ │ │ │ +# An Identity Provider URL, where the SAML authentication request will be sent. (string value) │ │ │ +#identity_provider_url = │ │ │ + │ │ │ +# Username (string value) │ │ │ +# Deprecated group/name - [mistral]/user_name │ │ │ +#username = │ │ │ + │ │ │ +# User's password (string value) │ │ │ +#password = │ │ │ + │ │ │ +# Tenant ID (string value) │ │ │ +#tenant_id = │ │ │ + │ │ │ +# Tenant Name (string value) │ │ │ +#tenant_name = │ │ │ + │ │ │ +# User id (string value) │ │ │ +#user_id = │ │ │ + │ │ │ +# Methods to authenticate with. (string value) │ │ │ +#auth_methods = │ │ │ + │ │ │ # OAuth 2.0 Client ID (string value) │ │ │ #client_id = │ │ │ │ │ │ # OAuth 2.0 Client Secret (string value) │ │ │ #client_secret = │ │ │ │ │ │ # OpenID Connect scope that is requested from authorization server. Note that the OpenID Connect specification states that "openid" must be │ │ │ @@ -473,96 +497,74 @@ │ │ │ # OpenID Connect Redirect URL (string value) │ │ │ #redirect_uri = │ │ │ │ │ │ # OAuth 2.0 Authorization Code (string value) │ │ │ # Deprecated group/name - [mistral]/authorization_code │ │ │ #code = │ │ │ │ │ │ -# User ID to login with (string value) │ │ │ -#user_id = │ │ │ - │ │ │ -# Username (string value) │ │ │ -# Deprecated group/name - [mistral]/user_name │ │ │ -#username = │ │ │ +# A key to be used in the Identity Provider access token endpoint to pass the OTP value. E.g. totp (string value) │ │ │ +#idp_otp_key = │ │ │ │ │ │ # User's domain id (string value) │ │ │ #user_domain_id = │ │ │ │ │ │ # User's domain name (string value) │ │ │ #user_domain_name = │ │ │ │ │ │ +# User's TOTP passcode (string value) │ │ │ +#passcode = │ │ │ + │ │ │ # Application credential auth secret (string value) │ │ │ #application_credential_secret = │ │ │ │ │ │ # Application credential ID (string value) │ │ │ #application_credential_id = │ │ │ │ │ │ # Application credential name (string value) │ │ │ #application_credential_name = │ │ │ │ │ │ -# User's TOTP passcode (string value) │ │ │ -#passcode = │ │ │ +# The endpoint that will always be used (string value) │ │ │ +#endpoint = │ │ │ + │ │ │ +# Token (string value) │ │ │ +#token = │ │ │ │ │ │ # Endpoint for OAuth2.0 Mutual-TLS Authorization (string value) │ │ │ #oauth2_endpoint = │ │ │ │ │ │ # Client credential ID for OAuth2.0 Mutual-TLS Authorization (string value) │ │ │ #oauth2_client_id = │ │ │ │ │ │ # Client secret for OAuth2.0 (string value) │ │ │ #oauth2_client_secret = │ │ │ │ │ │ -# Methods to authenticate with. (string value) │ │ │ -#auth_methods = │ │ │ - │ │ │ -# Tenant ID (string value) │ │ │ -#tenant_id = │ │ │ - │ │ │ -# Tenant Name (string value) │ │ │ -#tenant_name = │ │ │ - │ │ │ -# Token to authenticate with (string value) │ │ │ -#token = │ │ │ - │ │ │ -# User's password (string value) │ │ │ -#password = │ │ │ - │ │ │ -# The endpoint that will always be used (string value) │ │ │ -#endpoint = │ │ │ - │ │ │ -# An Identity Provider URL, where the SAML2 authentication request will be sent. (string value) │ │ │ -#identity_provider_url = │ │ │ - │ │ │ -# Service Provider's Endpoint (string value) │ │ │ -#service_provider_endpoint = │ │ │ - │ │ │ -# Service Provider's SAML Entity ID (string value) │ │ │ -#service_provider_entity_id = │ │ │ +# OAuth 2.0 Access Token (string value) │ │ │ +#access_token = │ │ │ │ │ │ # Optional domain ID to use with v3 and v2 parameters. It will be used for both the user and project domain in v3 and ignored in v2 │ │ │ # authentication. (string value) │ │ │ #default_domain_id = │ │ │ │ │ │ # Optional domain name to use with v3 API and v2 parameters. It will be used for both the user and project domain in v3 and ignored in v2 │ │ │ # authentication. (string value) │ │ │ #default_domain_name = │ │ │ │ │ │ -# A key to be used in the Identity Provider access token endpoint to pass the OTP value. E.g. totp (string value) │ │ │ -#idp_otp_key = │ │ │ - │ │ │ -# OAuth 2.0 Access Token (string value) │ │ │ -#access_token = │ │ │ - │ │ │ # OAuth 2.0 Device Authorization Endpoint. Note that if a discovery document is being passed this option will override the endpoint provided │ │ │ # by the server in the discovery document. (string value) │ │ │ #device_authorization_endpoint = │ │ │ │ │ │ # PKCE Challenge Method (RFC 7636) (string value) │ │ │ #code_challenge_method = │ │ │ │ │ │ +# Service Provider's Endpoint (string value) │ │ │ +#service_provider_endpoint = │ │ │ + │ │ │ +# Service Provider's SAML Entity ID (string value) │ │ │ +#service_provider_entity_id = │ │ │ + │ │ │ # OAuth Consumer ID/Key (string value) │ │ │ #consumer_key = │ │ │ │ │ │ # OAuth Consumer Secret (string value) │ │ │ #consumer_secret = │ │ │ │ │ │ # OAuth Access Key (string value) │ │ │ @@ -723,17 +725,19 @@ │ │ │ # Domain ID to scope to (string value) │ │ │ #domain_id = │ │ │ │ │ │ # Domain name to scope to (string value) │ │ │ #domain_name = │ │ │ │ │ │ # Project ID to scope to (string value) │ │ │ +# Deprecated group/name - [source_cloud]/tenant_id │ │ │ #project_id = │ │ │ │ │ │ # Project name to scope to (string value) │ │ │ +# Deprecated group/name - [source_cloud]/tenant_name │ │ │ #project_name = │ │ │ │ │ │ # Domain ID containing project (string value) │ │ │ #project_domain_id = │ │ │ │ │ │ # Domain name containing project (string value) │ │ │ #project_domain_name = │ │ │ @@ -743,14 +747,36 @@ │ │ │ │ │ │ # Identity Provider's name (string value) │ │ │ #identity_provider = │ │ │ │ │ │ # Protocol for federated plugin (string value) │ │ │ #protocol = │ │ │ │ │ │ +# An Identity Provider URL, where the SAML authentication request will be sent. (string value) │ │ │ +#identity_provider_url = │ │ │ + │ │ │ +# Username (string value) │ │ │ +# Deprecated group/name - [source_cloud]/user_name │ │ │ +#username = │ │ │ + │ │ │ +# User's password (string value) │ │ │ +#password = │ │ │ + │ │ │ +# Tenant ID (string value) │ │ │ +#tenant_id = │ │ │ + │ │ │ +# Tenant Name (string value) │ │ │ +#tenant_name = │ │ │ + │ │ │ +# User id (string value) │ │ │ +#user_id = │ │ │ + │ │ │ +# Methods to authenticate with. (string value) │ │ │ +#auth_methods = │ │ │ + │ │ │ # OAuth 2.0 Client ID (string value) │ │ │ #client_id = │ │ │ │ │ │ # OAuth 2.0 Client Secret (string value) │ │ │ #client_secret = │ │ │ │ │ │ # OpenID Connect scope that is requested from authorization server. Note that the OpenID Connect specification states that "openid" must be │ │ │ @@ -772,96 +798,74 @@ │ │ │ # OpenID Connect Redirect URL (string value) │ │ │ #redirect_uri = │ │ │ │ │ │ # OAuth 2.0 Authorization Code (string value) │ │ │ # Deprecated group/name - [source_cloud]/authorization_code │ │ │ #code = │ │ │ │ │ │ -# User ID to login with (string value) │ │ │ -#user_id = │ │ │ - │ │ │ -# Username (string value) │ │ │ -# Deprecated group/name - [source_cloud]/user_name │ │ │ -#username = │ │ │ +# A key to be used in the Identity Provider access token endpoint to pass the OTP value. E.g. totp (string value) │ │ │ +#idp_otp_key = │ │ │ │ │ │ # User's domain id (string value) │ │ │ #user_domain_id = │ │ │ │ │ │ # User's domain name (string value) │ │ │ #user_domain_name = │ │ │ │ │ │ +# User's TOTP passcode (string value) │ │ │ +#passcode = │ │ │ + │ │ │ # Application credential auth secret (string value) │ │ │ #application_credential_secret = │ │ │ │ │ │ # Application credential ID (string value) │ │ │ #application_credential_id = │ │ │ │ │ │ # Application credential name (string value) │ │ │ #application_credential_name = │ │ │ │ │ │ -# User's TOTP passcode (string value) │ │ │ -#passcode = │ │ │ +# The endpoint that will always be used (string value) │ │ │ +#endpoint = │ │ │ + │ │ │ +# Token (string value) │ │ │ +#token = │ │ │ │ │ │ # Endpoint for OAuth2.0 Mutual-TLS Authorization (string value) │ │ │ #oauth2_endpoint = │ │ │ │ │ │ # Client credential ID for OAuth2.0 Mutual-TLS Authorization (string value) │ │ │ #oauth2_client_id = │ │ │ │ │ │ # Client secret for OAuth2.0 (string value) │ │ │ #oauth2_client_secret = │ │ │ │ │ │ -# Methods to authenticate with. (string value) │ │ │ -#auth_methods = │ │ │ - │ │ │ -# Tenant ID (string value) │ │ │ -#tenant_id = │ │ │ - │ │ │ -# Tenant Name (string value) │ │ │ -#tenant_name = │ │ │ - │ │ │ -# Token to authenticate with (string value) │ │ │ -#token = │ │ │ - │ │ │ -# User's password (string value) │ │ │ -#password = │ │ │ - │ │ │ -# The endpoint that will always be used (string value) │ │ │ -#endpoint = │ │ │ - │ │ │ -# An Identity Provider URL, where the SAML2 authentication request will be sent. (string value) │ │ │ -#identity_provider_url = │ │ │ - │ │ │ -# Service Provider's Endpoint (string value) │ │ │ -#service_provider_endpoint = │ │ │ - │ │ │ -# Service Provider's SAML Entity ID (string value) │ │ │ -#service_provider_entity_id = │ │ │ +# OAuth 2.0 Access Token (string value) │ │ │ +#access_token = │ │ │ │ │ │ # Optional domain ID to use with v3 and v2 parameters. It will be used for both the user and project domain in v3 and ignored in v2 │ │ │ # authentication. (string value) │ │ │ #default_domain_id = │ │ │ │ │ │ # Optional domain name to use with v3 API and v2 parameters. It will be used for both the user and project domain in v3 and ignored in v2 │ │ │ # authentication. (string value) │ │ │ #default_domain_name = │ │ │ │ │ │ -# A key to be used in the Identity Provider access token endpoint to pass the OTP value. E.g. totp (string value) │ │ │ -#idp_otp_key = │ │ │ - │ │ │ -# OAuth 2.0 Access Token (string value) │ │ │ -#access_token = │ │ │ - │ │ │ # OAuth 2.0 Device Authorization Endpoint. Note that if a discovery document is being passed this option will override the endpoint provided │ │ │ # by the server in the discovery document. (string value) │ │ │ #device_authorization_endpoint = │ │ │ │ │ │ # PKCE Challenge Method (RFC 7636) (string value) │ │ │ #code_challenge_method = │ │ │ │ │ │ +# Service Provider's Endpoint (string value) │ │ │ +#service_provider_endpoint = │ │ │ + │ │ │ +# Service Provider's SAML Entity ID (string value) │ │ │ +#service_provider_entity_id = │ │ │ + │ │ │ # OAuth Consumer ID/Key (string value) │ │ │ #consumer_key = │ │ │ │ │ │ # OAuth Consumer Secret (string value) │ │ │ #consumer_secret = │ │ │ │ │ │ # OAuth Access Key (string value)