A response on the github issue follows:
https://github.com/waydroid/waydroid/issues/2030#issuecomment-3273229430
___________________________________________
It doesn't look like there's symlinks or anything set up for any previous Devuan
link. It should still work if you just use Debian's codename instead (bookworm).
The script (I put it into a new gist as the original is missing) appears to
already have a provision for overriding the name:
if [ -n "$1" ]; then
UPSTREAM_CODENAME="$1"
else
if [ -e /etc/os-release ]; then
...
Therefore, you can simply run it as:
curl -s
https://repo.waydro.id/ | sudo bash -s -- bookworm
Warning
Having said all the above, please be aware that it is not wise to run a
curl/wget operation and having it execute directly without vetting it first. I
would personally download it first to ensure it is OK to run. To be fair, the
package repository itself is also a vector of attack but I suspect it's less
likely to be targeted for compromise.