[Git][java-team/icedtea-web][master] 12 commits: d/p/javaws_change_java_policy.diff: do not set security policy for Java 25.

Emmanuel Bourg (@ebourg) gitlab at salsa.debian.org
Mon Mar 23 12:58:57 GMT 2026



Emmanuel Bourg pushed to branch master at Debian Java Maintainers / icedtea-web


Commits:
22542d0e by Vladimir Petko at 2025-12-15T19:46:27+13:00
d/p/javaws_change_java_policy.diff: do not set security policy for Java 25.

- - - - -
5b2fd661 by Vladimir Petko at 2025-12-15T20:51:44+13:00
d/p/jdk-25-disable-policy-panel.patch: disable policy panel when built with Java 25.

- - - - -
da9f2e2f by Vladimir Petko at 2025-12-15T20:51:49+13:00
d/p/jdk-25-jlnp-classloader.patch: disable security manager and custom jar caching callback.

- - - - -
cc98b4fc by Vladimir Petko at 2025-12-15T20:51:50+13:00
d/p/jdk-25-property-action.patch: replace GetPropertyAction with lambda.

- - - - -
852ca269 by Vladimir Petko at 2025-12-15T20:51:51+13:00
d/p/jdk-25-remove-files.patch: exclude files that use removed APIs.

- - - - -
6c97cefd by Vladimir Petko at 2025-12-15T20:51:52+13:00
d/p/series: update series

- - - - -
37c2697a by Vladimir Petko at 2025-12-15T20:51:53+13:00
changelog

- - - - -
80f56374 by Vladimir Petko at 2025-12-15T20:54:01+13:00
    - d/rules: do not install policy editor launcher.

- - - - -
aa05ad34 by Vladimir Petko at 2025-12-15T20:54:07+13:00
d/control: replace pkg-config with pkgconf.

- - - - -
72ad8ce2 by Vladimir Petko at 2025-12-15T20:54:08+13:00
d/icedtea-netx.install: do not install javaws.policy.

- - - - -
589b0b46 by Vladimir Petko at 2025-12-15T20:54:09+13:00
d/icedtea-netx.lintian-overrides: add old-fsf-address-in-copyright-file
    override.

- - - - -
ad4bf65e by Vladimir Petko at 2025-12-15T20:56:28+13:00
changelog

- - - - -


12 changed files:

- debian/changelog
- debian/control
- debian/icedtea-netx.install
- debian/icedtea-netx.lintian-overrides
- − debian/javaws.policy
- − debian/patches/javaws_change_java_policy.diff
- + debian/patches/jdk-25-disable-policy-panel.patch
- + debian/patches/jdk-25-jlnp-classloader.patch
- + debian/patches/jdk-25-property-action.patch
- + debian/patches/jdk-25-remove-files.patch
- debian/patches/series
- debian/rules


Changes:

=====================================
debian/changelog
=====================================
@@ -1,3 +1,22 @@
+icedtea-web (1.8.8-4) UNRELEASED; urgency=medium
+
+  * Team upload.
+  * Support Java 25 (Closes: #1108568):
+    - d/p/javaws_change_java_policy.diff: drop patch, Security Manager is
+      removed.
+    - d/p/jdk-25-disable-policy-panel.patch: remove policy editor panel.
+    - d/p/jdk-25-jlnp-classloader.patch: remove Security Manager and
+      custom jar caching callback.
+    - d/p/jdk-25-property-action.patch: replace GetPropertyAction with lambda.
+    - d/p/jdk-25-remove-files.patch: exclude files that use removed APIs.
+    - d/icedtea-netx.install: do not install javaws.policy.
+    - d/rules: do not install policy editor launcher.
+  * d/control: replace pkg-config with pkgconf.
+  * d/icedtea-netx.lintian-overrides: add old-fsf-address-in-copyright-file
+    override.
+
+ -- Vladimir Petko <vladimir.petko at canonical.com>  Mon, 15 Dec 2025 19:25:47 +1300
+
 icedtea-web (1.8.8-3) unstable; urgency=medium
 
   * Team upload.


=====================================
debian/control
=====================================
@@ -9,7 +9,7 @@ Build-Depends:
  dh-exec,
  librhino-java,
  libtagsoup-java,
- pkg-config,
+ pkgconf,
  zip
 Standards-Version: 4.7.0
 Vcs-Git: https://salsa.debian.org/java-team/icedtea-web.git


=====================================
debian/icedtea-netx.install
=====================================
@@ -1,6 +1,5 @@
 #!/usr/bin/dh-exec
 
-debian/javaws.policy                       /etc/icedtea-web/
 debian/*.desktop                           /usr/share/applications/
 debian/tmp/usr/share/icedtea-web/*         /usr/share/icedtea-web/
 debian/tmp/usr/share/pixmaps/javaws.png    /usr/share/pixmaps/


=====================================
debian/icedtea-netx.lintian-overrides
=====================================
@@ -1,2 +1,5 @@
 # handled by alternatives
 icedtea-netx binary: desktop-command-not-in-package
+
+# upstream copyright references old fsf address
+icedtea-netx binary: old-fsf-address-in-copyright-file
\ No newline at end of file


=====================================
debian/javaws.policy deleted
=====================================
@@ -1,4 +0,0 @@
-// Based on Oracle JDK policy file
-grant codeBase "file:/usr/share/icedtea-web/netx.jar" {
-    permission java.security.AllPermission;
-};
\ No newline at end of file


=====================================
debian/patches/javaws_change_java_policy.diff deleted
=====================================
@@ -1,23 +0,0 @@
-Description: Prepend -Djava.security.manager -Djava.security.policy=
- /etc/icedtea-web/javaws.policy to allow specific java security policy
- for Java WebStart.
- .
- The specified policy file will be loaded in *addition* to all the policy
- files that are specified in JVM security properties file:
- /etc/java-6-openjdk/security/java.policy 
-Author: Damien Raude-Morvan <drazzib at debian.org>
-Last-Update: 2011-09-21
-Forwarded: no
---- a/shell-launcher/launchers.sh.in
-+++ b/shell-launcher/launchers.sh.in
-@@ -188,6 +188,10 @@
- COMMAND[k]="-Dicedtea-web.bin.location=${BINARY_LOCATION}"
- k=$((k+1))
- 
-+COMMAND[k]="-Djava.security.manager"
-+k=$((k+1))
-+COMMAND[k]="-Djava.security.policy=/etc/icedtea-web/javaws.policy"
-+k=$((k+1))
- COMMAND[k]="${CLASSNAME}"
- k=$((k+1))
- j=0


=====================================
debian/patches/jdk-25-disable-policy-panel.patch
=====================================
@@ -0,0 +1,108 @@
+Description: remove policy editor for Java 25
+ This patch removes policy editor panels when compiled with 
+ Java 25.
+Author: Vladimir Petko <vladimir.petko at canonical.com>
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108568
+Forwarded: not-needed
+Last-Update: 2025-12-15
+
+--- a/netx/net/sourceforge/jnlp/controlpanel/ControlPanel.java
++++ b/netx/net/sourceforge/jnlp/controlpanel/ControlPanel.java
+@@ -253,8 +253,6 @@
+                 // TODO: This is commented out since this is not implemented yet
+                 // new SettingsPanel(Translator.R("CPTabRuntimes"), createRuntimesSettingsPanel()),
+                 new SettingsPanel(Translator.R("CPTabSecurity"), createSecuritySettingsPanel()),
+-                //todo refactor to work with tmp file and apply as asu designed it
+-                new SettingsPanel(Translator.R("CPTabPolicy"), createPolicySettingsPanel()),
+                 new SettingsPanel(Translator.R("APPEXTSECControlPanelExtendedAppletSecurityTitle"), new UnsignedAppletsTrustingListPanel(PathsAndFiles.APPLET_TRUST_SETTINGS_SYS.getFile(), PathsAndFiles.APPLET_TRUST_SETTINGS_USER.getFile(), this.config))
+         };
+ 
+@@ -349,10 +347,6 @@
+         return new SecuritySettingsPanel(this.config);
+     }
+ 
+-    private JPanel createPolicySettingsPanel() {
+-        return new PolicyPanel(this, this.config);
+-    }
+-
+     private JPanel createJVMSettingsPanel() {
+         return new JVMPanel(this.config);
+     }
+--- a/netx/net/sourceforge/jnlp/security/dialogs/CertWarningPane.java
++++ b/netx/net/sourceforge/jnlp/security/dialogs/CertWarningPane.java
+@@ -238,7 +238,6 @@
+             run.setText(R("ButRun"));
+         }
+         sandbox = new JButton(R("ButSandbox"));
+-        advancedOptions = new TemporaryPermissionsButton(file, securityDelegate, sandbox);
+ 
+         cancel = new JButton();
+         if (isHttpsCertTrustDialog) {
+@@ -253,7 +252,6 @@
+             run.setToolTipText(R("CertWarnRunTip"));
+         }
+         sandbox.setToolTipText(R("CertWarnSandboxTip"));
+-        advancedOptions.setToolTipText(R("CertWarnPolicyTip"));
+         if (isHttpsCertTrustDialog) {
+             cancel.setToolTipText(R("CertWarnHTTPSRejectTip"));
+         } else {
+@@ -273,15 +271,7 @@
+ 
+         initialFocusComponent = cancel;
+         buttonPanel.add(run);
+-        // Only iff this dialog is being invoked by VariableX509TrustManager.
+-        // In this case, the "sandbox" button and temporary permissions do not make any sense,
+-        // as we are asking the user if they trust some certificate that is not being used to sign an app
+-        // (eg "do you trust this certificate presented for the HTTPS connection to the applet's host site")
+-        // Since this dialog isn't talking about an applet/application, there is nothing to run sandboxed.
+-        if (!isHttpsCertTrustDialog) {
+-            buttonPanel.add(sandbox);
+-            buttonPanel.add(advancedOptions);
+-        }
++
+         buttonPanel.add(cancel);
+ 
+         buttonPanel.setBorder(BorderFactory.createEmptyBorder(10, 10, 10, 10));
+--- a/netx/net/sourceforge/jnlp/security/dialogs/apptrustwarningpanel/PartiallySignedAppTrustWarningPanel.java
++++ b/netx/net/sourceforge/jnlp/security/dialogs/apptrustwarningpanel/PartiallySignedAppTrustWarningPanel.java
+@@ -55,7 +55,6 @@
+ import net.sourceforge.jnlp.security.dialogresults.DialogResult;
+ import net.sourceforge.jnlp.security.dialogresults.SetValueHandler;
+ import net.sourceforge.jnlp.security.dialogresults.YesNoSandbox;
+-import net.sourceforge.jnlp.security.dialogs.TemporaryPermissionsButton;
+ import net.sourceforge.jnlp.security.dialogs.remember.ExecuteAppletAction;
+ import net.sourceforge.jnlp.tools.CertInformation;
+ import net.sourceforge.jnlp.tools.JarCertVerifier;
+@@ -64,7 +63,6 @@
+ 
+     private final JarCertVerifier jcv;
+     private final JButton sandboxButton;
+-    private final JButton advancedOptionsButton;
+ 
+     public PartiallySignedAppTrustWarningPanel(JNLPFile file, SecurityDialog securityDialog, SecurityDelegate securityDelegate) {
+         super(file, securityDialog);
+@@ -72,13 +70,11 @@
+         this.INFO_PANEL_HEIGHT = 250;
+ 
+         sandboxButton = new JButton();
+-        sandboxButton.setText(R("ButSandbox"));
++        sandboxButton.setText(R("ButRun"));
+         sandboxButton.addActionListener(SetValueHandler.createSetValueListener(parent,
+                  YesNoSandbox.sandbox()));
+-        advancedOptionsButton = new TemporaryPermissionsButton(file, securityDelegate, sandboxButton);
+ 
+         buttons.add(1, sandboxButton);
+-        buttons.add(2, advancedOptionsButton);
+ 
+         addComponents();
+         securityDialog.getViwableDialog().setMinimumSize(new Dimension(600, 400));
+--- a/netx/net/sourceforge/jnlp/security/dialogs/AccessWarningPane.java
++++ b/netx/net/sourceforge/jnlp/security/dialogs/AccessWarningPane.java
+@@ -303,7 +303,6 @@
+         initialFocusComponent = cancel;
+         buttonPanel.add(run);
+         buttonPanel.add(cancel);
+-        buttonPanel.add(showAdvanced);
+         buttonPanel.setBorder(BorderFactory.createEmptyBorder(10, 10, 10, 10));
+ 
+         //all of the above


=====================================
debian/patches/jdk-25-jlnp-classloader.patch
=====================================
@@ -0,0 +1,150 @@
+Description: remove security manager and custom callback
+ This patch removes security manager use and the custom
+ caching callback in the classloader. URLConnection 
+ already provides means to cache the jar files without
+ the need for the custom code.
+Author: Vladimir Petko <vladimir.petko at canonical.com>
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108568
+Forwarded: not-needed
+Last-Update: 2025-12-02
+
+--- a/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
++++ b/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
+@@ -53,10 +53,12 @@
+ import java.io.FileOutputStream;
+ import java.io.IOException;
+ import java.io.InputStream;
++import java.net.JarURLConnection;
+ import java.net.MalformedURLException;
+ import java.net.SocketPermission;
+ import java.net.URL;
+ import java.net.URLClassLoader;
++import java.net.URLConnection;
+ import java.security.AccessControlContext;
+ import java.security.AccessControlException;
+ import java.security.AccessController;
+@@ -80,6 +82,7 @@
+ import java.util.LinkedList;
+ import java.util.List;
+ import java.util.Map;
++import java.util.Objects;
+ import java.util.Set;
+ import java.util.TreeSet;
+ import java.util.Vector;
+@@ -1385,7 +1388,6 @@
+                                             URL fileURL = new URL("file://" + extractedJarLocation);
+                                             // there is no remote URL for this, so lets fake one
+                                             URL fakeRemote = new URL(jar.getLocation().toString() + "!" + je.getName());
+-                                            CachedJarFileCallback.getInstance().addMapping(fakeRemote, fileURL);
+                                             addURL(fakeRemote);
+ 
+                                             jarLocationSecurityMap.put(fakeRemote, jarSecurity);
+@@ -1406,7 +1408,6 @@
+                         // there is currently no mechanism to cache files per
+                         // instance.. so only index cached files
+                         if (localFile != null) {
+-                            CachedJarFileCallback.getInstance().addMapping(jar.getLocation(), localFile.toURI().toURL());
+ 
+                             try (JarFile jarFile = new JarFile(localFile.getAbsolutePath())) {
+                                 Manifest mf = jarFile.getManifest();
+@@ -1424,8 +1425,6 @@
+                                     jarIndexes.add(index);
+                                 }
+                             }
+-                        } else {
+-                            CachedJarFileCallback.getInstance().addMapping(jar.getLocation(), jar.getLocation());
+                         }
+ 
+                         OutputController.getLogger().log(OutputController.Level.ERROR_DEBUG, "Activate jar: " + location);
+@@ -1722,7 +1721,6 @@
+             });
+ 
+             addURL(remoteURL);
+-            CachedJarFileCallback.getInstance().addMapping(remoteURL, cachedUrl);
+ 
+         } catch (Exception e) {
+             // Do nothing. This code is called by loadClass which cannot 
+@@ -2071,12 +2069,6 @@
+      */
+     private void merge(JNLPClassLoader extLoader) {
+ 
+-        try {
+-            System.getSecurityManager().checkPermission(new AllPermission());
+-        } catch (SecurityException se) {
+-            throw new SecurityException("JNLPClassLoader() may only be called from trusted sources!");
+-        }
+-
+         // jars
+         for (URL u : extLoader.getURLs()) {
+             addURL(u);
+@@ -2171,11 +2163,6 @@
+      */
+     private void incrementLoaderUseCount() {
+ 
+-        // For use by trusted code only
+-        if (System.getSecurityManager() != null) {
+-            System.getSecurityManager().checkPermission(new AllPermission());
+-        }
+-
+         // NB: There will only ever be one class-loader per unique-key
+         synchronized (getUniqueKeyLock(file.getUniqueKey())) {
+             useCount++;
+@@ -2290,11 +2277,6 @@
+      */
+     public void decrementLoaderUseCount() {
+ 
+-        // For use by trusted code only
+-        if (System.getSecurityManager() != null) {
+-            System.getSecurityManager().checkPermission(new AllPermission());
+-        }
+-
+         String uniqueKey = file.getUniqueKey();
+ 
+         // NB: There will only ever be one class-loader per unique-key
+--- a/netx/net/sourceforge/jnlp/runtime/JNLPRuntime.java
++++ b/netx/net/sourceforge/jnlp/runtime/JNLPRuntime.java
+@@ -31,6 +31,7 @@
+ import java.net.InetAddress;
+ import java.net.ProxySelector;
+ import java.net.URL;
++import java.net.URLConnection;
+ import java.net.UnknownHostException;
+ import java.nio.channels.FileChannel;
+ import java.nio.channels.FileLock;
+@@ -74,7 +75,6 @@
+ import net.sourceforge.jnlp.util.logging.JavaConsole;
+ import net.sourceforge.jnlp.util.logging.LogConfig;
+ import net.sourceforge.jnlp.util.logging.OutputController;
+-import sun.net.www.protocol.jar.URLJarFile;
+ 
+ /**
+  * <p>
+@@ -265,7 +265,6 @@
+ 
+         if (securityEnabled) {
+             Policy.setPolicy(policy); // do first b/c our SM blocks setPolicy
+-            System.setSecurityManager(security);
+         }
+ 
+         securityDialogMessageHandler = startSecurityThreads();
+@@ -297,7 +296,8 @@
+         Security.setProperty("package.access", 
+                              Security.getProperty("package.access")+",net.sourceforge.jnlp");
+ 
+-        URLJarFile.setCallBack(CachedJarFileCallback.getInstance());
++        // ensure caching is enabled for the jar protocol
++        URLConnection.setDefaultUseCaches("jar", true);
+ 
+         initialized = true;
+ 
+--- a/configure.ac
++++ b/configure.ac
+@@ -178,8 +178,6 @@
+   fi
+ fi
+ IT_CHECK_FOR_CLASS(SUN_SECURITY_VALIDATOR_VALIDATOREXCEPTION, [sun.security.validator.ValidatorException], [some.pkg], [$JAVA_BASE])
+-IT_CHECK_FOR_CLASS(SUN_NET_WWW_PROTOCOL_JAR_URLJARFILE, [sun.net.www.protocol.jar.URLJarFile], [some.pkg], [$JAVA_BASE])
+-IT_CHECK_FOR_CLASS(SUN_NET_WWW_PROTOCOL_JAR_URLJARFILECALLBACK, [sun.net.www.protocol.jar.URLJarFileCallBack], [some.pkg], [$JAVA_BASE])
+ if test "x$build_linux" = xyes ; then
+   IT_CHECK_FOR_CLASS(SUN_AWT_X11_XEMBEDDEDFRAME, [sun.awt.X11.XEmbeddedFrame], [some.pkg], [$JAVA_DESKTOP])
+ fi


=====================================
debian/patches/jdk-25-property-action.patch
=====================================
@@ -0,0 +1,39 @@
+Description: replace GetPropertyAction with PrivilegedAction lambda
+ GetPropertyAction was removed in Java 25. It is a simple wrapper for 
+ a PrivilegedAction that retrieves line.separator property.
+Author: Vladimir Petko <vladimir.petko at canonical.com>
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108568
+Forwarded: not-needed
+Last-Update: 2025-12-15
+
+--- a/configure.ac
++++ b/configure.ac
+@@ -164,7 +164,6 @@
+ IT_CHECK_FOR_CLASS(SUN_SECURITY_UTIL_SECURITYCONSTANTS, [sun.security.util.SecurityConstants], [some.pkg], [$JAVA_BASE])
+ IT_CHECK_FOR_CLASS(SUN_SECURITY_UTIL_HOSTNAMECHECKER, [sun.security.util.HostnameChecker], [some.pkg], [$JAVA_BASE])
+ IT_CHECK_FOR_CLASS(SUN_SECURITY_X509_X500NAME, [sun.security.x509.X500Name], [some.pkg], [$JAVA_BASE])
+-IT_CHECK_FOR_CLASS(SUN_SECURITY_ACTION_GETPROPERTYACTION, [sun.security.action.GetPropertyAction], [some.pkg], [$JAVA_BASE])
+ # the classname cant be substitued by variable, as it is substituted to inner class
+ if test x"$HAVE_JAVA21" = xyes ; then
+   IT_CHECK_FOR_CLASS(HEXDUMPENCODER, [sun.security.util.HexDumpEncoder], [some.pkg], [$JAVA_BASE])
+--- a/netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/PlainTextFormatter.java
++++ b/netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/PlainTextFormatter.java
+@@ -37,6 +37,7 @@
+ 
+ package net.sourceforge.jnlp.util.docprovider.formatters.formatters;
+ 
++import java.security.PrivilegedAction;
+ import java.util.ArrayList;
+ import java.util.Arrays;
+ import java.util.List;
+@@ -52,8 +53,8 @@
+     public  static final String SUFFIX = "txt";
+     
+     public static String getLineSeparator() {
+-        return java.security.AccessController.doPrivileged(
+-                new sun.security.action.GetPropertyAction("line.separator"));
++        return java.security.AccessController.doPrivileged((PrivilegedAction<String>)() ->
++                System.getProperty("line.separator"));
+     }
+ 
+     private final String pargraohIndentation;


=====================================
debian/patches/jdk-25-remove-files.patch
=====================================
@@ -0,0 +1,53 @@
+Description: configure Java 25 build
+ This patch adds HAVA_JAVA25 conditional and excludes files that use
+ removed APIs from compilation.
+Author: Vladimir Petko <vladimir.petko at canonical.com>
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108568
+Forwarded: not-needed
+Last-Update: 2025-12-15
+
+--- a/acinclude.m4
++++ b/acinclude.m4
+@@ -846,12 +846,15 @@
+   AC_MSG_RESULT($JAVA_VERSION)
+   if test "${JAVA_VERSION}" -eq "8"; then
+     HAVE_JAVA8="yes"
++  elif test "$JAVA_VERSION" -ge "25"; then
++    HAVE_JAVA25="yes"
++    HAVE_JAVA21="yes"
+   elif test "$JAVA_VERSION" -ge "21"; then
+     HAVE_JAVA21="yes"
+   elif test "$JAVA_VERSION" -ge "9"; then
+     HAVE_JAVA9="yes"
+   fi
+-  if test -z "$HAVE_JAVA8" -a -z "$HAVE_JAVA9" -a -z "$HAVE_JAVA21"; then
++  if test -z "$HAVE_JAVA8" -a -z "$HAVE_JAVA9" -a -z "$HAVE_JAVA21" -a -z "$HAVE_JAVA25"; then
+     AC_MSG_ERROR([JDK8 or newer is required, detected was: $JAVA_VERSION])
+   fi
+   if ! test -z "$HAVE_JAVA8"; then
+@@ -864,6 +867,7 @@
+   AM_CONDITIONAL([HAVE_JAVA8], test x"${HAVE_JAVA8}" = "xyes")
+   AM_CONDITIONAL([HAVE_JAVA9], test x"${HAVE_JAVA9}" = "xyes")
+   AM_CONDITIONAL([HAVE_JAVA21], test x"${HAVE_JAVA21}" = "xyes")
++  AM_CONDITIONAL([HAVE_JAVA25], test x"${HAVE_JAVA25}" = "xyes")
+ ])
+ 
+ AC_DEFUN_ONCE([IT_FIND_KEYTOOL],
+--- a/Makefile.am
++++ b/Makefile.am
+@@ -821,6 +821,15 @@
+ 	sed -i '/RhinoBasedPacEvaluator/ d' $@
+ endif
+ 
++if HAVE_JAVA25
++	sed -i '/netx.net.sourceforge.jnlp.security.policyeditor/ d' $@
++	sed -i '/netx.net.sourceforge.jnlp.security.dialogs.TemporaryPermissions.java/ d' $@
++	sed -i '/netx.net.sourceforge.jnlp.security.dialogs.TemporaryPermissionsButton.java/ d' $@
++	sed -i '/tests.netx.unit.net.sourceforge.jnlp.security.dialogs.TemporaryPermissionsTest.java/ d' $@
++	sed -i '/netx.net.sourceforge.jnlp.controlpanel.PolicyPanel.java/ d' $@
++	sed -i '/netx.net.sourceforge.jnlp.runtime.CachedJarFileCallback.java/ d' $@
++endif
++
+ # if 'sed' will be missing on machine, use old IFS hack as on other places
+ # the 'sed' cycles is changing some custom version like 1.6.2 fedora23.4 to simple 1.6
+ # if changed, keep in mind that also 1.7 should bubble to 1.7


=====================================
debian/patches/series
=====================================
@@ -1,5 +1,4 @@
 am-maintainer-mode.diff
-javaws_change_java_policy.diff
 doc-english-only.diff
 disable-applet-support.diff
 java11-compatibility.diff
@@ -8,3 +7,7 @@ remove-pack200-support.patch
 build-with-java17.diff
 jdk-21-autoconf.patch
 jdk-21-jarindex.patch
+jdk-25-remove-files.patch
+jdk-25-property-action.patch
+jdk-25-jlnp-classloader.patch
+jdk-25-disable-policy-panel.patch


=====================================
debian/rules
=====================================
@@ -28,6 +28,8 @@ override_dh_auto_build:
 
 override_dh_auto_install:
 	$(MAKE) -C build install DESTDIR=$(CURDIR)/debian/tmp
+	# do not install policy editor launcher
+	rm -f debian/icedtea-netx/usr/share/icedtea-web/bin/policyeditor.sh
 
 	# compress manpages
 	find debian/tmp/usr/share/icedtea-web/man/man1/ -type f ! -type l | xargs gzip -9v -n



View it on GitLab: https://salsa.debian.org/java-team/icedtea-web/-/compare/484afae0c4c459a0b17853ae01eeb7fa2e5cb944...ad4bf65eab3202675a4fdfbc004d31b94c664a27

-- 
View it on GitLab: https://salsa.debian.org/java-team/icedtea-web/-/compare/484afae0c4c459a0b17853ae01eeb7fa2e5cb944...ad4bf65eab3202675a4fdfbc004d31b94c664a27
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/pkg-java-commits/attachments/20260323/228cf98b/attachment.htm>


More information about the pkg-java-commits mailing list