[Git][java-team/icedtea-web][master] 12 commits: d/p/javaws_change_java_policy.diff: do not set security policy for Java 25.
Emmanuel Bourg (@ebourg)
gitlab at salsa.debian.org
Mon Mar 23 12:58:57 GMT 2026
Emmanuel Bourg pushed to branch master at Debian Java Maintainers / icedtea-web
Commits:
22542d0e by Vladimir Petko at 2025-12-15T19:46:27+13:00
d/p/javaws_change_java_policy.diff: do not set security policy for Java 25.
- - - - -
5b2fd661 by Vladimir Petko at 2025-12-15T20:51:44+13:00
d/p/jdk-25-disable-policy-panel.patch: disable policy panel when built with Java 25.
- - - - -
da9f2e2f by Vladimir Petko at 2025-12-15T20:51:49+13:00
d/p/jdk-25-jlnp-classloader.patch: disable security manager and custom jar caching callback.
- - - - -
cc98b4fc by Vladimir Petko at 2025-12-15T20:51:50+13:00
d/p/jdk-25-property-action.patch: replace GetPropertyAction with lambda.
- - - - -
852ca269 by Vladimir Petko at 2025-12-15T20:51:51+13:00
d/p/jdk-25-remove-files.patch: exclude files that use removed APIs.
- - - - -
6c97cefd by Vladimir Petko at 2025-12-15T20:51:52+13:00
d/p/series: update series
- - - - -
37c2697a by Vladimir Petko at 2025-12-15T20:51:53+13:00
changelog
- - - - -
80f56374 by Vladimir Petko at 2025-12-15T20:54:01+13:00
- d/rules: do not install policy editor launcher.
- - - - -
aa05ad34 by Vladimir Petko at 2025-12-15T20:54:07+13:00
d/control: replace pkg-config with pkgconf.
- - - - -
72ad8ce2 by Vladimir Petko at 2025-12-15T20:54:08+13:00
d/icedtea-netx.install: do not install javaws.policy.
- - - - -
589b0b46 by Vladimir Petko at 2025-12-15T20:54:09+13:00
d/icedtea-netx.lintian-overrides: add old-fsf-address-in-copyright-file
override.
- - - - -
ad4bf65e by Vladimir Petko at 2025-12-15T20:56:28+13:00
changelog
- - - - -
12 changed files:
- debian/changelog
- debian/control
- debian/icedtea-netx.install
- debian/icedtea-netx.lintian-overrides
- − debian/javaws.policy
- − debian/patches/javaws_change_java_policy.diff
- + debian/patches/jdk-25-disable-policy-panel.patch
- + debian/patches/jdk-25-jlnp-classloader.patch
- + debian/patches/jdk-25-property-action.patch
- + debian/patches/jdk-25-remove-files.patch
- debian/patches/series
- debian/rules
Changes:
=====================================
debian/changelog
=====================================
@@ -1,3 +1,22 @@
+icedtea-web (1.8.8-4) UNRELEASED; urgency=medium
+
+ * Team upload.
+ * Support Java 25 (Closes: #1108568):
+ - d/p/javaws_change_java_policy.diff: drop patch, Security Manager is
+ removed.
+ - d/p/jdk-25-disable-policy-panel.patch: remove policy editor panel.
+ - d/p/jdk-25-jlnp-classloader.patch: remove Security Manager and
+ custom jar caching callback.
+ - d/p/jdk-25-property-action.patch: replace GetPropertyAction with lambda.
+ - d/p/jdk-25-remove-files.patch: exclude files that use removed APIs.
+ - d/icedtea-netx.install: do not install javaws.policy.
+ - d/rules: do not install policy editor launcher.
+ * d/control: replace pkg-config with pkgconf.
+ * d/icedtea-netx.lintian-overrides: add old-fsf-address-in-copyright-file
+ override.
+
+ -- Vladimir Petko <vladimir.petko at canonical.com> Mon, 15 Dec 2025 19:25:47 +1300
+
icedtea-web (1.8.8-3) unstable; urgency=medium
* Team upload.
=====================================
debian/control
=====================================
@@ -9,7 +9,7 @@ Build-Depends:
dh-exec,
librhino-java,
libtagsoup-java,
- pkg-config,
+ pkgconf,
zip
Standards-Version: 4.7.0
Vcs-Git: https://salsa.debian.org/java-team/icedtea-web.git
=====================================
debian/icedtea-netx.install
=====================================
@@ -1,6 +1,5 @@
#!/usr/bin/dh-exec
-debian/javaws.policy /etc/icedtea-web/
debian/*.desktop /usr/share/applications/
debian/tmp/usr/share/icedtea-web/* /usr/share/icedtea-web/
debian/tmp/usr/share/pixmaps/javaws.png /usr/share/pixmaps/
=====================================
debian/icedtea-netx.lintian-overrides
=====================================
@@ -1,2 +1,5 @@
# handled by alternatives
icedtea-netx binary: desktop-command-not-in-package
+
+# upstream copyright references old fsf address
+icedtea-netx binary: old-fsf-address-in-copyright-file
\ No newline at end of file
=====================================
debian/javaws.policy deleted
=====================================
@@ -1,4 +0,0 @@
-// Based on Oracle JDK policy file
-grant codeBase "file:/usr/share/icedtea-web/netx.jar" {
- permission java.security.AllPermission;
-};
\ No newline at end of file
=====================================
debian/patches/javaws_change_java_policy.diff deleted
=====================================
@@ -1,23 +0,0 @@
-Description: Prepend -Djava.security.manager -Djava.security.policy=
- /etc/icedtea-web/javaws.policy to allow specific java security policy
- for Java WebStart.
- .
- The specified policy file will be loaded in *addition* to all the policy
- files that are specified in JVM security properties file:
- /etc/java-6-openjdk/security/java.policy
-Author: Damien Raude-Morvan <drazzib at debian.org>
-Last-Update: 2011-09-21
-Forwarded: no
---- a/shell-launcher/launchers.sh.in
-+++ b/shell-launcher/launchers.sh.in
-@@ -188,6 +188,10 @@
- COMMAND[k]="-Dicedtea-web.bin.location=${BINARY_LOCATION}"
- k=$((k+1))
-
-+COMMAND[k]="-Djava.security.manager"
-+k=$((k+1))
-+COMMAND[k]="-Djava.security.policy=/etc/icedtea-web/javaws.policy"
-+k=$((k+1))
- COMMAND[k]="${CLASSNAME}"
- k=$((k+1))
- j=0
=====================================
debian/patches/jdk-25-disable-policy-panel.patch
=====================================
@@ -0,0 +1,108 @@
+Description: remove policy editor for Java 25
+ This patch removes policy editor panels when compiled with
+ Java 25.
+Author: Vladimir Petko <vladimir.petko at canonical.com>
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108568
+Forwarded: not-needed
+Last-Update: 2025-12-15
+
+--- a/netx/net/sourceforge/jnlp/controlpanel/ControlPanel.java
++++ b/netx/net/sourceforge/jnlp/controlpanel/ControlPanel.java
+@@ -253,8 +253,6 @@
+ // TODO: This is commented out since this is not implemented yet
+ // new SettingsPanel(Translator.R("CPTabRuntimes"), createRuntimesSettingsPanel()),
+ new SettingsPanel(Translator.R("CPTabSecurity"), createSecuritySettingsPanel()),
+- //todo refactor to work with tmp file and apply as asu designed it
+- new SettingsPanel(Translator.R("CPTabPolicy"), createPolicySettingsPanel()),
+ new SettingsPanel(Translator.R("APPEXTSECControlPanelExtendedAppletSecurityTitle"), new UnsignedAppletsTrustingListPanel(PathsAndFiles.APPLET_TRUST_SETTINGS_SYS.getFile(), PathsAndFiles.APPLET_TRUST_SETTINGS_USER.getFile(), this.config))
+ };
+
+@@ -349,10 +347,6 @@
+ return new SecuritySettingsPanel(this.config);
+ }
+
+- private JPanel createPolicySettingsPanel() {
+- return new PolicyPanel(this, this.config);
+- }
+-
+ private JPanel createJVMSettingsPanel() {
+ return new JVMPanel(this.config);
+ }
+--- a/netx/net/sourceforge/jnlp/security/dialogs/CertWarningPane.java
++++ b/netx/net/sourceforge/jnlp/security/dialogs/CertWarningPane.java
+@@ -238,7 +238,6 @@
+ run.setText(R("ButRun"));
+ }
+ sandbox = new JButton(R("ButSandbox"));
+- advancedOptions = new TemporaryPermissionsButton(file, securityDelegate, sandbox);
+
+ cancel = new JButton();
+ if (isHttpsCertTrustDialog) {
+@@ -253,7 +252,6 @@
+ run.setToolTipText(R("CertWarnRunTip"));
+ }
+ sandbox.setToolTipText(R("CertWarnSandboxTip"));
+- advancedOptions.setToolTipText(R("CertWarnPolicyTip"));
+ if (isHttpsCertTrustDialog) {
+ cancel.setToolTipText(R("CertWarnHTTPSRejectTip"));
+ } else {
+@@ -273,15 +271,7 @@
+
+ initialFocusComponent = cancel;
+ buttonPanel.add(run);
+- // Only iff this dialog is being invoked by VariableX509TrustManager.
+- // In this case, the "sandbox" button and temporary permissions do not make any sense,
+- // as we are asking the user if they trust some certificate that is not being used to sign an app
+- // (eg "do you trust this certificate presented for the HTTPS connection to the applet's host site")
+- // Since this dialog isn't talking about an applet/application, there is nothing to run sandboxed.
+- if (!isHttpsCertTrustDialog) {
+- buttonPanel.add(sandbox);
+- buttonPanel.add(advancedOptions);
+- }
++
+ buttonPanel.add(cancel);
+
+ buttonPanel.setBorder(BorderFactory.createEmptyBorder(10, 10, 10, 10));
+--- a/netx/net/sourceforge/jnlp/security/dialogs/apptrustwarningpanel/PartiallySignedAppTrustWarningPanel.java
++++ b/netx/net/sourceforge/jnlp/security/dialogs/apptrustwarningpanel/PartiallySignedAppTrustWarningPanel.java
+@@ -55,7 +55,6 @@
+ import net.sourceforge.jnlp.security.dialogresults.DialogResult;
+ import net.sourceforge.jnlp.security.dialogresults.SetValueHandler;
+ import net.sourceforge.jnlp.security.dialogresults.YesNoSandbox;
+-import net.sourceforge.jnlp.security.dialogs.TemporaryPermissionsButton;
+ import net.sourceforge.jnlp.security.dialogs.remember.ExecuteAppletAction;
+ import net.sourceforge.jnlp.tools.CertInformation;
+ import net.sourceforge.jnlp.tools.JarCertVerifier;
+@@ -64,7 +63,6 @@
+
+ private final JarCertVerifier jcv;
+ private final JButton sandboxButton;
+- private final JButton advancedOptionsButton;
+
+ public PartiallySignedAppTrustWarningPanel(JNLPFile file, SecurityDialog securityDialog, SecurityDelegate securityDelegate) {
+ super(file, securityDialog);
+@@ -72,13 +70,11 @@
+ this.INFO_PANEL_HEIGHT = 250;
+
+ sandboxButton = new JButton();
+- sandboxButton.setText(R("ButSandbox"));
++ sandboxButton.setText(R("ButRun"));
+ sandboxButton.addActionListener(SetValueHandler.createSetValueListener(parent,
+ YesNoSandbox.sandbox()));
+- advancedOptionsButton = new TemporaryPermissionsButton(file, securityDelegate, sandboxButton);
+
+ buttons.add(1, sandboxButton);
+- buttons.add(2, advancedOptionsButton);
+
+ addComponents();
+ securityDialog.getViwableDialog().setMinimumSize(new Dimension(600, 400));
+--- a/netx/net/sourceforge/jnlp/security/dialogs/AccessWarningPane.java
++++ b/netx/net/sourceforge/jnlp/security/dialogs/AccessWarningPane.java
+@@ -303,7 +303,6 @@
+ initialFocusComponent = cancel;
+ buttonPanel.add(run);
+ buttonPanel.add(cancel);
+- buttonPanel.add(showAdvanced);
+ buttonPanel.setBorder(BorderFactory.createEmptyBorder(10, 10, 10, 10));
+
+ //all of the above
=====================================
debian/patches/jdk-25-jlnp-classloader.patch
=====================================
@@ -0,0 +1,150 @@
+Description: remove security manager and custom callback
+ This patch removes security manager use and the custom
+ caching callback in the classloader. URLConnection
+ already provides means to cache the jar files without
+ the need for the custom code.
+Author: Vladimir Petko <vladimir.petko at canonical.com>
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108568
+Forwarded: not-needed
+Last-Update: 2025-12-02
+
+--- a/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
++++ b/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
+@@ -53,10 +53,12 @@
+ import java.io.FileOutputStream;
+ import java.io.IOException;
+ import java.io.InputStream;
++import java.net.JarURLConnection;
+ import java.net.MalformedURLException;
+ import java.net.SocketPermission;
+ import java.net.URL;
+ import java.net.URLClassLoader;
++import java.net.URLConnection;
+ import java.security.AccessControlContext;
+ import java.security.AccessControlException;
+ import java.security.AccessController;
+@@ -80,6 +82,7 @@
+ import java.util.LinkedList;
+ import java.util.List;
+ import java.util.Map;
++import java.util.Objects;
+ import java.util.Set;
+ import java.util.TreeSet;
+ import java.util.Vector;
+@@ -1385,7 +1388,6 @@
+ URL fileURL = new URL("file://" + extractedJarLocation);
+ // there is no remote URL for this, so lets fake one
+ URL fakeRemote = new URL(jar.getLocation().toString() + "!" + je.getName());
+- CachedJarFileCallback.getInstance().addMapping(fakeRemote, fileURL);
+ addURL(fakeRemote);
+
+ jarLocationSecurityMap.put(fakeRemote, jarSecurity);
+@@ -1406,7 +1408,6 @@
+ // there is currently no mechanism to cache files per
+ // instance.. so only index cached files
+ if (localFile != null) {
+- CachedJarFileCallback.getInstance().addMapping(jar.getLocation(), localFile.toURI().toURL());
+
+ try (JarFile jarFile = new JarFile(localFile.getAbsolutePath())) {
+ Manifest mf = jarFile.getManifest();
+@@ -1424,8 +1425,6 @@
+ jarIndexes.add(index);
+ }
+ }
+- } else {
+- CachedJarFileCallback.getInstance().addMapping(jar.getLocation(), jar.getLocation());
+ }
+
+ OutputController.getLogger().log(OutputController.Level.ERROR_DEBUG, "Activate jar: " + location);
+@@ -1722,7 +1721,6 @@
+ });
+
+ addURL(remoteURL);
+- CachedJarFileCallback.getInstance().addMapping(remoteURL, cachedUrl);
+
+ } catch (Exception e) {
+ // Do nothing. This code is called by loadClass which cannot
+@@ -2071,12 +2069,6 @@
+ */
+ private void merge(JNLPClassLoader extLoader) {
+
+- try {
+- System.getSecurityManager().checkPermission(new AllPermission());
+- } catch (SecurityException se) {
+- throw new SecurityException("JNLPClassLoader() may only be called from trusted sources!");
+- }
+-
+ // jars
+ for (URL u : extLoader.getURLs()) {
+ addURL(u);
+@@ -2171,11 +2163,6 @@
+ */
+ private void incrementLoaderUseCount() {
+
+- // For use by trusted code only
+- if (System.getSecurityManager() != null) {
+- System.getSecurityManager().checkPermission(new AllPermission());
+- }
+-
+ // NB: There will only ever be one class-loader per unique-key
+ synchronized (getUniqueKeyLock(file.getUniqueKey())) {
+ useCount++;
+@@ -2290,11 +2277,6 @@
+ */
+ public void decrementLoaderUseCount() {
+
+- // For use by trusted code only
+- if (System.getSecurityManager() != null) {
+- System.getSecurityManager().checkPermission(new AllPermission());
+- }
+-
+ String uniqueKey = file.getUniqueKey();
+
+ // NB: There will only ever be one class-loader per unique-key
+--- a/netx/net/sourceforge/jnlp/runtime/JNLPRuntime.java
++++ b/netx/net/sourceforge/jnlp/runtime/JNLPRuntime.java
+@@ -31,6 +31,7 @@
+ import java.net.InetAddress;
+ import java.net.ProxySelector;
+ import java.net.URL;
++import java.net.URLConnection;
+ import java.net.UnknownHostException;
+ import java.nio.channels.FileChannel;
+ import java.nio.channels.FileLock;
+@@ -74,7 +75,6 @@
+ import net.sourceforge.jnlp.util.logging.JavaConsole;
+ import net.sourceforge.jnlp.util.logging.LogConfig;
+ import net.sourceforge.jnlp.util.logging.OutputController;
+-import sun.net.www.protocol.jar.URLJarFile;
+
+ /**
+ * <p>
+@@ -265,7 +265,6 @@
+
+ if (securityEnabled) {
+ Policy.setPolicy(policy); // do first b/c our SM blocks setPolicy
+- System.setSecurityManager(security);
+ }
+
+ securityDialogMessageHandler = startSecurityThreads();
+@@ -297,7 +296,8 @@
+ Security.setProperty("package.access",
+ Security.getProperty("package.access")+",net.sourceforge.jnlp");
+
+- URLJarFile.setCallBack(CachedJarFileCallback.getInstance());
++ // ensure caching is enabled for the jar protocol
++ URLConnection.setDefaultUseCaches("jar", true);
+
+ initialized = true;
+
+--- a/configure.ac
++++ b/configure.ac
+@@ -178,8 +178,6 @@
+ fi
+ fi
+ IT_CHECK_FOR_CLASS(SUN_SECURITY_VALIDATOR_VALIDATOREXCEPTION, [sun.security.validator.ValidatorException], [some.pkg], [$JAVA_BASE])
+-IT_CHECK_FOR_CLASS(SUN_NET_WWW_PROTOCOL_JAR_URLJARFILE, [sun.net.www.protocol.jar.URLJarFile], [some.pkg], [$JAVA_BASE])
+-IT_CHECK_FOR_CLASS(SUN_NET_WWW_PROTOCOL_JAR_URLJARFILECALLBACK, [sun.net.www.protocol.jar.URLJarFileCallBack], [some.pkg], [$JAVA_BASE])
+ if test "x$build_linux" = xyes ; then
+ IT_CHECK_FOR_CLASS(SUN_AWT_X11_XEMBEDDEDFRAME, [sun.awt.X11.XEmbeddedFrame], [some.pkg], [$JAVA_DESKTOP])
+ fi
=====================================
debian/patches/jdk-25-property-action.patch
=====================================
@@ -0,0 +1,39 @@
+Description: replace GetPropertyAction with PrivilegedAction lambda
+ GetPropertyAction was removed in Java 25. It is a simple wrapper for
+ a PrivilegedAction that retrieves line.separator property.
+Author: Vladimir Petko <vladimir.petko at canonical.com>
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108568
+Forwarded: not-needed
+Last-Update: 2025-12-15
+
+--- a/configure.ac
++++ b/configure.ac
+@@ -164,7 +164,6 @@
+ IT_CHECK_FOR_CLASS(SUN_SECURITY_UTIL_SECURITYCONSTANTS, [sun.security.util.SecurityConstants], [some.pkg], [$JAVA_BASE])
+ IT_CHECK_FOR_CLASS(SUN_SECURITY_UTIL_HOSTNAMECHECKER, [sun.security.util.HostnameChecker], [some.pkg], [$JAVA_BASE])
+ IT_CHECK_FOR_CLASS(SUN_SECURITY_X509_X500NAME, [sun.security.x509.X500Name], [some.pkg], [$JAVA_BASE])
+-IT_CHECK_FOR_CLASS(SUN_SECURITY_ACTION_GETPROPERTYACTION, [sun.security.action.GetPropertyAction], [some.pkg], [$JAVA_BASE])
+ # the classname cant be substitued by variable, as it is substituted to inner class
+ if test x"$HAVE_JAVA21" = xyes ; then
+ IT_CHECK_FOR_CLASS(HEXDUMPENCODER, [sun.security.util.HexDumpEncoder], [some.pkg], [$JAVA_BASE])
+--- a/netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/PlainTextFormatter.java
++++ b/netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/PlainTextFormatter.java
+@@ -37,6 +37,7 @@
+
+ package net.sourceforge.jnlp.util.docprovider.formatters.formatters;
+
++import java.security.PrivilegedAction;
+ import java.util.ArrayList;
+ import java.util.Arrays;
+ import java.util.List;
+@@ -52,8 +53,8 @@
+ public static final String SUFFIX = "txt";
+
+ public static String getLineSeparator() {
+- return java.security.AccessController.doPrivileged(
+- new sun.security.action.GetPropertyAction("line.separator"));
++ return java.security.AccessController.doPrivileged((PrivilegedAction<String>)() ->
++ System.getProperty("line.separator"));
+ }
+
+ private final String pargraohIndentation;
=====================================
debian/patches/jdk-25-remove-files.patch
=====================================
@@ -0,0 +1,53 @@
+Description: configure Java 25 build
+ This patch adds HAVA_JAVA25 conditional and excludes files that use
+ removed APIs from compilation.
+Author: Vladimir Petko <vladimir.petko at canonical.com>
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108568
+Forwarded: not-needed
+Last-Update: 2025-12-15
+
+--- a/acinclude.m4
++++ b/acinclude.m4
+@@ -846,12 +846,15 @@
+ AC_MSG_RESULT($JAVA_VERSION)
+ if test "${JAVA_VERSION}" -eq "8"; then
+ HAVE_JAVA8="yes"
++ elif test "$JAVA_VERSION" -ge "25"; then
++ HAVE_JAVA25="yes"
++ HAVE_JAVA21="yes"
+ elif test "$JAVA_VERSION" -ge "21"; then
+ HAVE_JAVA21="yes"
+ elif test "$JAVA_VERSION" -ge "9"; then
+ HAVE_JAVA9="yes"
+ fi
+- if test -z "$HAVE_JAVA8" -a -z "$HAVE_JAVA9" -a -z "$HAVE_JAVA21"; then
++ if test -z "$HAVE_JAVA8" -a -z "$HAVE_JAVA9" -a -z "$HAVE_JAVA21" -a -z "$HAVE_JAVA25"; then
+ AC_MSG_ERROR([JDK8 or newer is required, detected was: $JAVA_VERSION])
+ fi
+ if ! test -z "$HAVE_JAVA8"; then
+@@ -864,6 +867,7 @@
+ AM_CONDITIONAL([HAVE_JAVA8], test x"${HAVE_JAVA8}" = "xyes")
+ AM_CONDITIONAL([HAVE_JAVA9], test x"${HAVE_JAVA9}" = "xyes")
+ AM_CONDITIONAL([HAVE_JAVA21], test x"${HAVE_JAVA21}" = "xyes")
++ AM_CONDITIONAL([HAVE_JAVA25], test x"${HAVE_JAVA25}" = "xyes")
+ ])
+
+ AC_DEFUN_ONCE([IT_FIND_KEYTOOL],
+--- a/Makefile.am
++++ b/Makefile.am
+@@ -821,6 +821,15 @@
+ sed -i '/RhinoBasedPacEvaluator/ d' $@
+ endif
+
++if HAVE_JAVA25
++ sed -i '/netx.net.sourceforge.jnlp.security.policyeditor/ d' $@
++ sed -i '/netx.net.sourceforge.jnlp.security.dialogs.TemporaryPermissions.java/ d' $@
++ sed -i '/netx.net.sourceforge.jnlp.security.dialogs.TemporaryPermissionsButton.java/ d' $@
++ sed -i '/tests.netx.unit.net.sourceforge.jnlp.security.dialogs.TemporaryPermissionsTest.java/ d' $@
++ sed -i '/netx.net.sourceforge.jnlp.controlpanel.PolicyPanel.java/ d' $@
++ sed -i '/netx.net.sourceforge.jnlp.runtime.CachedJarFileCallback.java/ d' $@
++endif
++
+ # if 'sed' will be missing on machine, use old IFS hack as on other places
+ # the 'sed' cycles is changing some custom version like 1.6.2 fedora23.4 to simple 1.6
+ # if changed, keep in mind that also 1.7 should bubble to 1.7
=====================================
debian/patches/series
=====================================
@@ -1,5 +1,4 @@
am-maintainer-mode.diff
-javaws_change_java_policy.diff
doc-english-only.diff
disable-applet-support.diff
java11-compatibility.diff
@@ -8,3 +7,7 @@ remove-pack200-support.patch
build-with-java17.diff
jdk-21-autoconf.patch
jdk-21-jarindex.patch
+jdk-25-remove-files.patch
+jdk-25-property-action.patch
+jdk-25-jlnp-classloader.patch
+jdk-25-disable-policy-panel.patch
=====================================
debian/rules
=====================================
@@ -28,6 +28,8 @@ override_dh_auto_build:
override_dh_auto_install:
$(MAKE) -C build install DESTDIR=$(CURDIR)/debian/tmp
+ # do not install policy editor launcher
+ rm -f debian/icedtea-netx/usr/share/icedtea-web/bin/policyeditor.sh
# compress manpages
find debian/tmp/usr/share/icedtea-web/man/man1/ -type f ! -type l | xargs gzip -9v -n
View it on GitLab: https://salsa.debian.org/java-team/icedtea-web/-/compare/484afae0c4c459a0b17853ae01eeb7fa2e5cb944...ad4bf65eab3202675a4fdfbc004d31b94c664a27
--
View it on GitLab: https://salsa.debian.org/java-team/icedtea-web/-/compare/484afae0c4c459a0b17853ae01eeb7fa2e5cb944...ad4bf65eab3202675a4fdfbc004d31b94c664a27
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/pkg-java-commits/attachments/20260323/228cf98b/attachment.htm>
More information about the pkg-java-commits
mailing list