{
"diffoscope-json-version": 1,
"source1": "/srv/reproducible-results/rbuild-debian/tmp.OspGZ93qzi/b1/bcfg2_1.4.0~pre2+git141-g6d40dace6358-2_i386.changes",
"source2": "/srv/reproducible-results/rbuild-debian/tmp.OspGZ93qzi/b2/bcfg2_1.4.0~pre2+git141-g6d40dace6358-2_i386.changes",
"unified_diff": null,
"details": [
{
"source1": "Files",
"source2": "Files",
"unified_diff": "@@ -1,5 +1,5 @@\n \n- d85d31e1eb4410d76e899f558a21a371 1982816 doc optional bcfg2-doc_1.4.0~pre2+git141-g6d40dace6358-2_all.deb\n+ 8fb7a0e5bba475a51ab7a4fe6f0e81ab 1982844 doc optional bcfg2-doc_1.4.0~pre2+git141-g6d40dace6358-2_all.deb\n db9c8c8544eb7c0bf80d346333698ab9 276628 admin optional bcfg2-server_1.4.0~pre2+git141-g6d40dace6358-2_all.deb\n 2881b561226b504a34a109b6af4c396d 55236 admin optional bcfg2-web_1.4.0~pre2+git141-g6d40dace6358-2_all.deb\n 1d851fad28691a1719951c9c571651d5 130776 admin optional bcfg2_1.4.0~pre2+git141-g6d40dace6358-2_all.deb\n"
},
{
"source1": "bcfg2-doc_1.4.0~pre2+git141-g6d40dace6358-2_all.deb",
"source2": "bcfg2-doc_1.4.0~pre2+git141-g6d40dace6358-2_all.deb",
"unified_diff": null,
"details": [
{
"source1": "file list",
"source2": "file list",
"unified_diff": "@@ -1,3 +1,3 @@\n -rw-r--r-- 0 0 0 4 2018-11-04 11:19:47.000000 debian-binary\n -rw-r--r-- 0 0 0 12632 2018-11-04 11:19:47.000000 control.tar.xz\n--rw-r--r-- 0 0 0 1969992 2018-11-04 11:19:47.000000 data.tar.xz\n+-rw-r--r-- 0 0 0 1970020 2018-11-04 11:19:47.000000 data.tar.xz\n"
},
{
"source1": "control.tar.xz",
"source2": "control.tar.xz",
"unified_diff": null,
"details": [
{
"source1": "control.tar",
"source2": "control.tar",
"unified_diff": null,
"details": [
{
"source1": "./control",
"source2": "./control",
"unified_diff": "@@ -1,13 +1,13 @@\n Package: bcfg2-doc\n Source: bcfg2\n Version: 1.4.0~pre2+git141-g6d40dace6358-2\n Architecture: all\n Maintainer: Debian QA Group Permissions for the ACL. This can either be a single octal\n+digit (e.g., \n
\n-\n-\n+
\n
\n-\n
\n-Description \n Values \n Required \n Default \n \n \n \n+lax_decryption
\n-\n- \n perms
\n-\n-
\n-bcfg2.conf
. \n-true
| false
No \n-None \n-MetadataACLElements
\n-
\n-
\n-\n-\n-
\n-\n-
\n- \n-\n-\n-Name \n-Description \n-Values \n-Required \n-Default \n- \n-\n- \n-method
\n \n-
\n+6
would indicate read and write, but not\n+execute), or a symbolic mode including \u2018r\u2019, \u2018w\u2019, and \u2018x\u2019.\n+You can include \u2018-\u2018 for operations that are not permitted,\n+but it\u2019s not required. I.e., all of the following are\n+identical:perms="5"\n+perms="rx"\n+perms="r-x"\n+
\n string
Yes \n None \n \n-
\n-py:genshiAttrs
Name | \n-Description | \n-Values | \n-Required | \n-Default | \n-|
---|---|---|---|---|---|
method | \n+|||||
type | \n \n-\n+ ACL type \n | \n-string | \n+default | access | \n Yes | \nNone | \n
py:genshiAttrs
Name | \n-Description | \n-Values | \n-Required | \n-Default | \n-|
---|---|---|---|---|---|
name | \n+|||||
group | \n \n-\n+ Group the ACL applies to (with\n+ \n scope = group ). | \n string | \n No | \nNone | \n|
negate | \n+|||||
scope | \n \n-\n+ ACL scope. This is omitted for\n+ \n type = default . | \n-true | false | \n+user | group | other | \n No | \nNone | \n
py:genshiAttrs
MetadataACLElements
Name | \n-Description | \n-Values | \n-Required | \n-Default | \n-
---|---|---|---|---|
name | \n+||||
user | \n \n-\n+ User the ACL applies to (with \n scope \n+= user ). | \n string | \n No | \nNone | \n
negate | \n-\n-\n- | \n-true | false | \n-No | \n-None | \n-
py:genshiAttrs
MetadataACLElements
py:genshiElements
\n-\n-Most Genshi templating directives can be used either as\n-standalone elements or as attributes on existing elements.\n-This element group defines the standalone tags.
Name | \n-Description | \n-Values | \n-Required | \n-Default | \n-
---|---|---|---|---|
py:vars | \n-\n-\n- | \n-string | \n-Yes | \n-None | \n-
Any arbitrary child elements allowed
\n-Name | \n-Description | \n-Values | \n-Required | \n-Default | \n-
---|---|---|---|---|
py:value | \n-\n-\n- | \n-string | \n-Yes | \n-None | \n-
Any arbitrary child elements allowed
\n-Name | \n-Description | \n-Values | \n-Required | \n-Default | \n-
---|---|---|---|---|
py:test | \n-\n-\n- | \n-string | \n-No | \n-None | \n-
\n-\n-The
\n-when
directive is used inside\n-py:chooseType
or\n-choose
to handle a single\n-specific condition.
Name | \n-Description | \n-Values | \n-Required | \n-Default | \n-
---|---|---|---|---|
py:test | \n-\n-\n- | \n-string | \n-Yes | \n-None | \n-
Any arbitrary child elements allowed
\n-Any
\n-Any arbitrary child elements allowed
\n-Any
\n-Name | \n-Description | \n-Values | \n-Required | \n-Default | \n-
---|---|---|---|---|
py:each | \n-\n-\n- | \n-string | \n-Yes | \n-None | \n-
Any arbitrary child elements allowed
\n-Name | \n-Description | \n-Values | \n-Required | \n-Default | \n-
---|---|---|---|---|
py:test | \n-\n-\n- | \n-string | \n-Yes | \n-None | \n-
Any arbitrary child elements allowed
\n-Name | \n-Description | \n-Values | \n-Required | \n-Default | \n-
---|---|---|---|---|
py:path | \n-\n-\n- | \n-string | \n-Yes | \n-None | \n-
py:buffer | \n-\n-\n- | \n-true | false | \n-No | \n-true | \n-
py:once | \n-\n-\n- | \n-true | false | \n-No | \n-false | \n-
py:recursive | \n-\n-\n- | \n-true | false | \n-No | \n-true | \n-
Any arbitrary child elements allowed
\n-Name | \n-Description | \n-Values | \n-Required | \n-Default | \n-
---|---|---|---|---|
py:function | \n-\n-\n- | \n-string | \n-Yes | \n-None | \n-
Any arbitrary child elements allowed
\n-It is not currently possible to manually set an effective rights mask;\n the mask will be automatically calculated from the given ACLs when\n they are applied.
\nFor directories either no default ACL entries or at least an entry for\n" } ] } ] } ] } ] }