Path: csiph.com!news.samoylyk.net!gothmog.csi.it!bofh.it!news.nic.it!robomod From: Andreas Tille Newsgroups: linux.debian.bugs.dist,linux.debian.maint.java Subject: Bug#1038113: New upstream version injected into Git - help needed to build Date: Wed, 29 Jan 2025 22:40:01 +0100 Message-ID: References: X-Mailbox-Line: From debian-bugs-dist-request@lists.debian.org Wed Jan 29 21:39:16 2025 Old-Return-Path: X-Spam-Flag: NO X-Spam-Score: -3.751 Reply-To: Andreas Tille , 1038113@bugs.debian.org Resent-To: debian-bugs-dist@lists.debian.org Resent-Cc: Debian Java Maintainers X-Debian-Pr-Message: followup 1038113 X-Debian-Pr-Package: src:triplea X-Debian-Pr-Source: triplea MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Debian-Message: from BTS X-Mailing-List: archive/latest/1883758 List-ID: List-URL: Approved: robomod@news.nic.it Lines: 17 Organization: linux.* mail to news gateway Sender: robomod@news.nic.it X-Original-Cc: Debian Java List X-Original-Date: Wed, 29 Jan 2025 22:34:41 +0100 X-Original-Message-ID: X-Original-References: <168683932378.82573.11726686865079208363.reportbug@batou.> Xref: csiph.com linux.debian.bugs.dist:1230913 linux.debian.maint.java:12908 Hi, I had a look into triplea and at least polished the packaging including setting Vcs fields properly. I also tried to work on the latest upstream version which includes fixing the CVE issue. Unfortunately I did not managed to build the package successfully. You can see the build result in Salsa CI[1]. Any help would be welcome. Kind regards Andreas. [1] https://salsa.debian.org/java-team/triplea/-/jobs/7005860 -- https://fam-tille.de